CVE-2025-13551: Buffer Overflow in D-Link DIR-822K
A vulnerability was identified in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. The affected element is an unknown function of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-13551 is a remote buffer overflow vulnerability identified in the D-Link DIR-822K and DWR-M920 routers, specifically in firmware versions 1.00_20250513164613 and 1.1.50. The vulnerability resides in an unspecified function related to the /boafrm/formWanConfigSetup endpoint, where the 'submit-url' parameter is improperly handled, allowing an attacker to overflow a buffer. This flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The buffer overflow can lead to arbitrary code execution, potentially allowing attackers to take full control of the affected device, disrupt network operations, or exfiltrate sensitive information. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with the low attack complexity and no need for privileges or user interaction. Although no active exploitation has been reported yet, public exploit code exists, increasing the likelihood of future attacks. The vulnerability affects critical networking infrastructure, making it a significant threat to organizations relying on these D-Link devices. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies to prevent exploitation.
Potential Impact
For European organizations, the impact of CVE-2025-13551 can be substantial. Compromise of D-Link DIR-822K or DWR-M920 routers can lead to full network infiltration, allowing attackers to intercept or manipulate sensitive communications, disrupt business operations, or use the compromised devices as footholds for further attacks. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure, where network reliability and data confidentiality are paramount. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, potentially affecting large numbers of devices across multiple organizations. Additionally, the availability of public exploit code lowers the barrier for attackers, including less sophisticated threat actors. The vulnerability could also be leveraged in botnet campaigns or ransomware attacks, amplifying its impact. European entities with extensive deployments of D-Link networking equipment are at heightened risk, potentially facing regulatory and reputational consequences if breaches occur.
Mitigation Recommendations
1. Immediate action should focus on monitoring vendor communications for official firmware updates addressing CVE-2025-13551 and applying patches as soon as they become available. 2. Until patches are released, implement network-level protections such as firewall rules to restrict access to the /boafrm/formWanConfigSetup endpoint, especially from untrusted networks or the internet. 3. Employ network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Conduct active network monitoring and intrusion detection to identify anomalous traffic patterns targeting the vulnerable parameter 'submit-url'. 5. Disable remote management features on affected devices if not strictly necessary, reducing the attack surface. 6. Perform regular audits of device firmware versions across the organization to identify and inventory vulnerable devices. 7. Educate IT staff on the specific nature of this vulnerability to ensure rapid response and remediation. 8. Consider deploying network-based application firewalls capable of detecting and blocking buffer overflow attempts targeting HTTP parameters. 9. Engage with D-Link support channels for guidance and potential workarounds. 10. Prepare incident response plans tailored to potential exploitation scenarios involving compromised routers.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13551: Buffer Overflow in D-Link DIR-822K
Description
A vulnerability was identified in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. The affected element is an unknown function of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13551 is a remote buffer overflow vulnerability identified in the D-Link DIR-822K and DWR-M920 routers, specifically in firmware versions 1.00_20250513164613 and 1.1.50. The vulnerability resides in an unspecified function related to the /boafrm/formWanConfigSetup endpoint, where the 'submit-url' parameter is improperly handled, allowing an attacker to overflow a buffer. This flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The buffer overflow can lead to arbitrary code execution, potentially allowing attackers to take full control of the affected device, disrupt network operations, or exfiltrate sensitive information. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with the low attack complexity and no need for privileges or user interaction. Although no active exploitation has been reported yet, public exploit code exists, increasing the likelihood of future attacks. The vulnerability affects critical networking infrastructure, making it a significant threat to organizations relying on these D-Link devices. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies to prevent exploitation.
Potential Impact
For European organizations, the impact of CVE-2025-13551 can be substantial. Compromise of D-Link DIR-822K or DWR-M920 routers can lead to full network infiltration, allowing attackers to intercept or manipulate sensitive communications, disrupt business operations, or use the compromised devices as footholds for further attacks. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure, where network reliability and data confidentiality are paramount. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, potentially affecting large numbers of devices across multiple organizations. Additionally, the availability of public exploit code lowers the barrier for attackers, including less sophisticated threat actors. The vulnerability could also be leveraged in botnet campaigns or ransomware attacks, amplifying its impact. European entities with extensive deployments of D-Link networking equipment are at heightened risk, potentially facing regulatory and reputational consequences if breaches occur.
Mitigation Recommendations
1. Immediate action should focus on monitoring vendor communications for official firmware updates addressing CVE-2025-13551 and applying patches as soon as they become available. 2. Until patches are released, implement network-level protections such as firewall rules to restrict access to the /boafrm/formWanConfigSetup endpoint, especially from untrusted networks or the internet. 3. Employ network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Conduct active network monitoring and intrusion detection to identify anomalous traffic patterns targeting the vulnerable parameter 'submit-url'. 5. Disable remote management features on affected devices if not strictly necessary, reducing the attack surface. 6. Perform regular audits of device firmware versions across the organization to identify and inventory vulnerable devices. 7. Educate IT staff on the specific nature of this vulnerability to ensure rapid response and remediation. 8. Consider deploying network-based application firewalls capable of detecting and blocking buffer overflow attempts targeting HTTP parameters. 9. Engage with D-Link support channels for guidance and potential workarounds. 10. Prepare incident response plans tailored to potential exploitation scenarios involving compromised routers.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T15:12:25.391Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69230a5f237b8255a033933a
Added to database: 11/23/2025, 1:21:35 PM
Last enriched: 11/30/2025, 2:03:42 PM
Last updated: 1/8/2026, 2:30:22 PM
Views: 110
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21895: CWE-703: Improper Check or Handling of Exceptional Conditions in RustCrypto RSA
LowCVE-2025-8307: CWE-257 Storing Passwords in a Recoverable Format in Asseco InfoMedica Plus
MediumCVE-2025-8306: CWE-1220 Insufficient Granularity of Access Control in Asseco InfoMedica Plus
MediumCVE-2025-14025: Incorrect Execution-Assigned Permissions in Red Hat Red Hat Ansible Automation Platform 2
HighCVE-2026-21891: CWE-287: Improper Authentication in IceWhaleTech ZimaOS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.