Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13551: Buffer Overflow in D-Link DIR-822K

0
High
VulnerabilityCVE-2025-13551cvecve-2025-13551
Published: Sun Nov 23 2025 (11/23/2025, 13:02:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-822K

Description

A vulnerability was identified in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. The affected element is an unknown function of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 11/30/2025, 14:03:42 UTC

Technical Analysis

CVE-2025-13551 is a remote buffer overflow vulnerability identified in the D-Link DIR-822K and DWR-M920 routers, specifically in firmware versions 1.00_20250513164613 and 1.1.50. The vulnerability resides in an unspecified function related to the /boafrm/formWanConfigSetup endpoint, where the 'submit-url' parameter is improperly handled, allowing an attacker to overflow a buffer. This flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The buffer overflow can lead to arbitrary code execution, potentially allowing attackers to take full control of the affected device, disrupt network operations, or exfiltrate sensitive information. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with the low attack complexity and no need for privileges or user interaction. Although no active exploitation has been reported yet, public exploit code exists, increasing the likelihood of future attacks. The vulnerability affects critical networking infrastructure, making it a significant threat to organizations relying on these D-Link devices. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies to prevent exploitation.

Potential Impact

For European organizations, the impact of CVE-2025-13551 can be substantial. Compromise of D-Link DIR-822K or DWR-M920 routers can lead to full network infiltration, allowing attackers to intercept or manipulate sensitive communications, disrupt business operations, or use the compromised devices as footholds for further attacks. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure, where network reliability and data confidentiality are paramount. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, potentially affecting large numbers of devices across multiple organizations. Additionally, the availability of public exploit code lowers the barrier for attackers, including less sophisticated threat actors. The vulnerability could also be leveraged in botnet campaigns or ransomware attacks, amplifying its impact. European entities with extensive deployments of D-Link networking equipment are at heightened risk, potentially facing regulatory and reputational consequences if breaches occur.

Mitigation Recommendations

1. Immediate action should focus on monitoring vendor communications for official firmware updates addressing CVE-2025-13551 and applying patches as soon as they become available. 2. Until patches are released, implement network-level protections such as firewall rules to restrict access to the /boafrm/formWanConfigSetup endpoint, especially from untrusted networks or the internet. 3. Employ network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Conduct active network monitoring and intrusion detection to identify anomalous traffic patterns targeting the vulnerable parameter 'submit-url'. 5. Disable remote management features on affected devices if not strictly necessary, reducing the attack surface. 6. Perform regular audits of device firmware versions across the organization to identify and inventory vulnerable devices. 7. Educate IT staff on the specific nature of this vulnerability to ensure rapid response and remediation. 8. Consider deploying network-based application firewalls capable of detecting and blocking buffer overflow attempts targeting HTTP parameters. 9. Engage with D-Link support channels for guidance and potential workarounds. 10. Prepare incident response plans tailored to potential exploitation scenarios involving compromised routers.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T15:12:25.391Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69230a5f237b8255a033933a

Added to database: 11/23/2025, 1:21:35 PM

Last enriched: 11/30/2025, 2:03:42 PM

Last updated: 1/8/2026, 2:30:22 PM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats