CVE-2025-13550: Buffer Overflow in D-Link DIR-822K
A vulnerability was determined in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. Impacted is an unknown function of the file /boafrm/formVpnConfigSetup. Executing manipulation of the argument submit-url can lead to buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-13550 is a buffer overflow vulnerability identified in specific firmware versions (1.00_20250513164613 and 1.1.50) of the D-Link DIR-822K and DWR-M920 routers. The vulnerability resides in an unknown function within the /boafrm/formVpnConfigSetup file, where the submit-url argument is improperly handled, allowing an attacker to overflow a buffer remotely. This flaw does not require authentication or user interaction, making it accessible to remote attackers over the network. Exploiting this vulnerability could allow attackers to execute arbitrary code, potentially gaining control over the affected device or causing a denial of service by crashing the system. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits have been observed in the wild yet, the public disclosure of the exploit code increases the likelihood of imminent attacks. The vulnerability affects devices commonly used in home and small office environments but can also be found in enterprise settings, especially in Europe where D-Link has a significant market share. The lack of available patches at the time of disclosure necessitates immediate defensive measures to mitigate risk.
Potential Impact
The vulnerability poses a significant threat to European organizations using the affected D-Link routers, potentially allowing attackers to remotely execute arbitrary code or disrupt network availability. This can lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of business operations. Critical infrastructure sectors relying on these devices for VPN or network connectivity could face operational outages or compromise of confidential communications. The high severity and ease of exploitation increase the risk of widespread attacks, especially in environments where these routers are deployed without additional security controls. The impact extends beyond individual devices, as compromised routers can serve as footholds for lateral movement within corporate networks or as platforms for launching further attacks. The absence of patches at disclosure time exacerbates the threat, requiring organizations to implement compensating controls to reduce exposure.
Mitigation Recommendations
1. Immediately inventory and identify all D-Link DIR-822K and DWR-M920 devices running the vulnerable firmware versions within the network. 2. Monitor D-Link official channels for firmware updates addressing CVE-2025-13550 and apply patches promptly once available. 3. Until patches are released, restrict network access to the vulnerable devices by implementing firewall rules that block inbound traffic to the /boafrm/formVpnConfigSetup endpoint or limit access to trusted IP addresses only. 4. Employ network segmentation to isolate vulnerable routers from critical systems and sensitive data environments. 5. Enable and monitor detailed logging on routers and network devices to detect unusual or suspicious requests targeting the submit-url parameter. 6. Use intrusion detection/prevention systems (IDS/IPS) with updated signatures to identify exploitation attempts. 7. Educate IT staff about this vulnerability and ensure incident response plans include procedures for potential exploitation scenarios. 8. Consider temporary replacement of vulnerable devices with alternative hardware if patching is delayed and risk is unacceptable.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13550: Buffer Overflow in D-Link DIR-822K
Description
A vulnerability was determined in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. Impacted is an unknown function of the file /boafrm/formVpnConfigSetup. Executing manipulation of the argument submit-url can lead to buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-13550 is a buffer overflow vulnerability identified in specific firmware versions (1.00_20250513164613 and 1.1.50) of the D-Link DIR-822K and DWR-M920 routers. The vulnerability resides in an unknown function within the /boafrm/formVpnConfigSetup file, where the submit-url argument is improperly handled, allowing an attacker to overflow a buffer remotely. This flaw does not require authentication or user interaction, making it accessible to remote attackers over the network. Exploiting this vulnerability could allow attackers to execute arbitrary code, potentially gaining control over the affected device or causing a denial of service by crashing the system. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no confirmed exploits have been observed in the wild yet, the public disclosure of the exploit code increases the likelihood of imminent attacks. The vulnerability affects devices commonly used in home and small office environments but can also be found in enterprise settings, especially in Europe where D-Link has a significant market share. The lack of available patches at the time of disclosure necessitates immediate defensive measures to mitigate risk.
Potential Impact
The vulnerability poses a significant threat to European organizations using the affected D-Link routers, potentially allowing attackers to remotely execute arbitrary code or disrupt network availability. This can lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of business operations. Critical infrastructure sectors relying on these devices for VPN or network connectivity could face operational outages or compromise of confidential communications. The high severity and ease of exploitation increase the risk of widespread attacks, especially in environments where these routers are deployed without additional security controls. The impact extends beyond individual devices, as compromised routers can serve as footholds for lateral movement within corporate networks or as platforms for launching further attacks. The absence of patches at disclosure time exacerbates the threat, requiring organizations to implement compensating controls to reduce exposure.
Mitigation Recommendations
1. Immediately inventory and identify all D-Link DIR-822K and DWR-M920 devices running the vulnerable firmware versions within the network. 2. Monitor D-Link official channels for firmware updates addressing CVE-2025-13550 and apply patches promptly once available. 3. Until patches are released, restrict network access to the vulnerable devices by implementing firewall rules that block inbound traffic to the /boafrm/formVpnConfigSetup endpoint or limit access to trusted IP addresses only. 4. Employ network segmentation to isolate vulnerable routers from critical systems and sensitive data environments. 5. Enable and monitor detailed logging on routers and network devices to detect unusual or suspicious requests targeting the submit-url parameter. 6. Use intrusion detection/prevention systems (IDS/IPS) with updated signatures to identify exploitation attempts. 7. Educate IT staff about this vulnerability and ensure incident response plans include procedures for potential exploitation scenarios. 8. Consider temporary replacement of vulnerable devices with alternative hardware if patching is delayed and risk is unacceptable.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T15:12:20.265Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6923054af051329c1a1f7d3b
Added to database: 11/23/2025, 12:59:54 PM
Last enriched: 11/23/2025, 1:13:10 PM
Last updated: 11/23/2025, 8:02:18 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13566: Double Free in jarun nnn
MediumCVE-2025-13565: Weak Password Recovery in SourceCodester Inventory Management System
MediumCVE-2025-13564: Denial of Service in SourceCodester Pre-School Management System
MediumCVE-2025-13562: Command Injection in D-Link DIR-852
MediumCVE-2025-13561: SQL Injection in SourceCodester Company Website CMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.