Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13549: Buffer Overflow in D-Link DIR-822K

0
High
VulnerabilityCVE-2025-13549cvecve-2025-13549
Published: Sun Nov 23 2025 (11/23/2025, 12:02:07 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-822K

Description

A vulnerability was found in D-Link DIR-822K 1.00. This issue affects the function sub_455524 of the file /boafrm/formNtp. Performing manipulation of the argument submit-url results in buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 11/30/2025, 13:07:42 UTC

Technical Analysis

CVE-2025-13549 identifies a buffer overflow vulnerability in the D-Link DIR-822K router, specifically in firmware version 1.00. The vulnerability resides in the function sub_455524 within the /boafrm/formNtp endpoint, which processes the submit-url argument. Improper handling of this argument allows an attacker to overflow a buffer, potentially overwriting adjacent memory. This can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Although no active exploitation has been reported, a public exploit is available, increasing the likelihood of attacks. The affected product is a widely used consumer and small office router, often deployed in home and enterprise edge networks. The lack of an official patch at the time of publication necessitates immediate mitigation efforts to prevent exploitation. The vulnerability's presence in a network-facing service increases the risk of widespread compromise, especially in environments where the device is exposed to untrusted networks or the internet.

Potential Impact

For European organizations, this vulnerability poses significant risks including unauthorized access, data exfiltration, network disruption, and potential lateral movement within internal networks. Exploitation could lead to full compromise of the affected router, undermining network perimeter defenses and exposing connected devices. Critical infrastructure, small and medium enterprises, and home offices relying on the DIR-822K for internet connectivity or VPN services are particularly vulnerable. The high impact on confidentiality, integrity, and availability means sensitive data could be intercepted or manipulated, and network availability could be disrupted, affecting business continuity. The remote and unauthenticated nature of the exploit increases the threat surface, especially for organizations with inadequate network segmentation or exposed management interfaces. Given the public availability of an exploit, the window for attackers to leverage this vulnerability is open, potentially leading to targeted attacks or widespread scanning and exploitation campaigns across Europe.

Mitigation Recommendations

1. Immediately check for and apply any official firmware updates from D-Link addressing CVE-2025-13549. 2. If no patch is available, restrict access to the router’s management interface by implementing network-level controls such as firewall rules limiting access to trusted IP addresses only. 3. Disable remote management features or services that expose the vulnerable endpoint to untrusted networks. 4. Employ network intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting the submit-url parameter. 5. Regularly audit and monitor router logs for unusual activity or repeated malformed requests to /boafrm/formNtp. 6. Segment critical network assets behind additional layers of security to reduce the impact of a compromised router. 7. Educate IT staff on the vulnerability and ensure rapid incident response capabilities are in place. 8. Consider replacing affected devices with models from vendors with more timely security updates if patching is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T15:09:09.241Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6922fabcf051329c1a12556a

Added to database: 11/23/2025, 12:14:52 PM

Last enriched: 11/30/2025, 1:07:42 PM

Last updated: 1/8/2026, 2:30:24 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats