Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13550: Buffer Overflow in D-Link DIR-822K

0
High
VulnerabilityCVE-2025-13550cvecve-2025-13550
Published: Sun Nov 23 2025 (11/23/2025, 12:32:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-822K

Description

A vulnerability was determined in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. Impacted is an unknown function of the file /boafrm/formVpnConfigSetup. Executing manipulation of the argument submit-url can lead to buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 11/23/2025, 13:13:10 UTC

Technical Analysis

CVE-2025-13550 is a buffer overflow vulnerability identified in specific firmware versions (1.00_20250513164613 and 1.1.50) of the D-Link DIR-822K and DWR-M920 routers. The vulnerability resides in an unknown function within the /boafrm/formVpnConfigSetup file, where the submit-url argument is improperly handled, allowing an attacker to overflow a buffer remotely. This flaw does not require authentication or user interaction, making it accessible to remote attackers over the network. Exploiting this vulnerability could allow attackers to execute arbitrary code, potentially gaining control over the affected device or causing a denial of service by crashing the system. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits have been observed in the wild yet, the public disclosure of the exploit code increases the likelihood of imminent attacks. The vulnerability affects devices commonly used in home and small office environments but can also be found in enterprise settings, especially in Europe where D-Link has a significant market share. The lack of available patches at the time of disclosure necessitates immediate defensive measures to mitigate risk.

Potential Impact

The vulnerability poses a significant threat to European organizations using the affected D-Link routers, potentially allowing attackers to remotely execute arbitrary code or disrupt network availability. This can lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of business operations. Critical infrastructure sectors relying on these devices for VPN or network connectivity could face operational outages or compromise of confidential communications. The high severity and ease of exploitation increase the risk of widespread attacks, especially in environments where these routers are deployed without additional security controls. The impact extends beyond individual devices, as compromised routers can serve as footholds for lateral movement within corporate networks or as platforms for launching further attacks. The absence of patches at disclosure time exacerbates the threat, requiring organizations to implement compensating controls to reduce exposure.

Mitigation Recommendations

1. Immediately inventory and identify all D-Link DIR-822K and DWR-M920 devices running the vulnerable firmware versions within the network. 2. Monitor D-Link official channels for firmware updates addressing CVE-2025-13550 and apply patches promptly once available. 3. Until patches are released, restrict network access to the vulnerable devices by implementing firewall rules that block inbound traffic to the /boafrm/formVpnConfigSetup endpoint or limit access to trusted IP addresses only. 4. Employ network segmentation to isolate vulnerable routers from critical systems and sensitive data environments. 5. Enable and monitor detailed logging on routers and network devices to detect unusual or suspicious requests targeting the submit-url parameter. 6. Use intrusion detection/prevention systems (IDS/IPS) with updated signatures to identify exploitation attempts. 7. Educate IT staff about this vulnerability and ensure incident response plans include procedures for potential exploitation scenarios. 8. Consider temporary replacement of vulnerable devices with alternative hardware if patching is delayed and risk is unacceptable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T15:12:20.265Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6923054af051329c1a1f7d3b

Added to database: 11/23/2025, 12:59:54 PM

Last enriched: 11/23/2025, 1:13:10 PM

Last updated: 11/23/2025, 8:02:18 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats