Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13551: Buffer Overflow in D-Link DIR-822K

0
High
VulnerabilityCVE-2025-13551cvecve-2025-13551
Published: Sun Nov 23 2025 (11/23/2025, 13:02:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-822K

Description

A vulnerability was identified in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. The affected element is an unknown function of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 11/23/2025, 13:21:49 UTC

Technical Analysis

CVE-2025-13551 is a buffer overflow vulnerability identified in the D-Link DIR-822K and DWR-M920 routers running specific firmware versions (1.00_20250513164613 and 1.1.50). The vulnerability resides in an unspecified function within the /boafrm/formWanConfigSetup file, where the submit-url parameter can be manipulated to overflow a buffer. This flaw allows an attacker to remotely execute arbitrary code without requiring authentication or user interaction, as the attack vector is network accessible (AV:N) and has low attack complexity (AC:L). The vulnerability impacts the confidentiality, integrity, and availability of the affected devices, potentially allowing full device compromise. Although no patch links are currently provided, the presence of a public exploit increases the urgency for mitigation. The CVSS 4.0 score of 8.7 reflects the high risk posed by this vulnerability, emphasizing the need for immediate attention. The vulnerability does not require privileges or user interaction, making it highly exploitable in real-world scenarios. The lack of segmentation or exposure of these routers to the internet could facilitate widespread exploitation. This vulnerability is particularly concerning for organizations relying on these devices for network access and security, as compromise could lead to lateral movement within networks or disruption of services.

Potential Impact

For European organizations, the impact of CVE-2025-13551 can be significant. Compromise of D-Link DIR-822K or DWR-M920 routers could lead to unauthorized remote control of network gateways, enabling attackers to intercept, modify, or disrupt network traffic. This can result in data breaches, loss of sensitive information, and disruption of business operations. Critical infrastructure sectors such as finance, healthcare, and government agencies using these devices may face increased risks of espionage, sabotage, or ransomware attacks. The vulnerability's remote exploitability without authentication means attackers can target exposed devices directly from the internet, increasing the attack surface. Additionally, the availability of a public exploit lowers the barrier for attackers, potentially leading to widespread scanning and exploitation campaigns. The integrity of network communications could be compromised, affecting trust in digital services and compliance with data protection regulations like GDPR. Organizations may also face reputational damage and financial losses due to service outages or data leaks stemming from this vulnerability.

Mitigation Recommendations

1. Immediate action should focus on obtaining and applying official firmware updates from D-Link once released to address CVE-2025-13551. 2. Until patches are available, isolate affected routers from direct internet exposure by placing them behind firewalls or VPNs to limit remote access. 3. Implement strict network segmentation to restrict lateral movement if a device is compromised. 4. Monitor network traffic for unusual activity targeting the /boafrm/formWanConfigSetup endpoint or suspicious attempts to manipulate the submit-url parameter. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts. 6. Replace end-of-life or unsupported devices with newer models that receive timely security updates. 7. Conduct regular security audits and vulnerability assessments focusing on network edge devices. 8. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving router compromise. 9. Disable or restrict remote management interfaces if not strictly necessary. 10. Maintain an inventory of all D-Link devices to ensure comprehensive coverage of mitigation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T15:12:25.391Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69230a5f237b8255a033933a

Added to database: 11/23/2025, 1:21:35 PM

Last enriched: 11/23/2025, 1:21:49 PM

Last updated: 11/23/2025, 5:56:08 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats