CVE-2025-13551: Buffer Overflow in D-Link DIR-822K
A vulnerability was identified in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. The affected element is an unknown function of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-13551 is a buffer overflow vulnerability identified in the D-Link DIR-822K and DWR-M920 routers running specific firmware versions (1.00_20250513164613 and 1.1.50). The vulnerability resides in an unspecified function within the /boafrm/formWanConfigSetup file, where the submit-url parameter can be manipulated to overflow a buffer. This flaw allows an attacker to remotely execute arbitrary code without requiring authentication or user interaction, as the attack vector is network accessible (AV:N) and has low attack complexity (AC:L). The vulnerability impacts the confidentiality, integrity, and availability of the affected devices, potentially allowing full device compromise. Although no patch links are currently provided, the presence of a public exploit increases the urgency for mitigation. The CVSS 4.0 score of 8.7 reflects the high risk posed by this vulnerability, emphasizing the need for immediate attention. The vulnerability does not require privileges or user interaction, making it highly exploitable in real-world scenarios. The lack of segmentation or exposure of these routers to the internet could facilitate widespread exploitation. This vulnerability is particularly concerning for organizations relying on these devices for network access and security, as compromise could lead to lateral movement within networks or disruption of services.
Potential Impact
For European organizations, the impact of CVE-2025-13551 can be significant. Compromise of D-Link DIR-822K or DWR-M920 routers could lead to unauthorized remote control of network gateways, enabling attackers to intercept, modify, or disrupt network traffic. This can result in data breaches, loss of sensitive information, and disruption of business operations. Critical infrastructure sectors such as finance, healthcare, and government agencies using these devices may face increased risks of espionage, sabotage, or ransomware attacks. The vulnerability's remote exploitability without authentication means attackers can target exposed devices directly from the internet, increasing the attack surface. Additionally, the availability of a public exploit lowers the barrier for attackers, potentially leading to widespread scanning and exploitation campaigns. The integrity of network communications could be compromised, affecting trust in digital services and compliance with data protection regulations like GDPR. Organizations may also face reputational damage and financial losses due to service outages or data leaks stemming from this vulnerability.
Mitigation Recommendations
1. Immediate action should focus on obtaining and applying official firmware updates from D-Link once released to address CVE-2025-13551. 2. Until patches are available, isolate affected routers from direct internet exposure by placing them behind firewalls or VPNs to limit remote access. 3. Implement strict network segmentation to restrict lateral movement if a device is compromised. 4. Monitor network traffic for unusual activity targeting the /boafrm/formWanConfigSetup endpoint or suspicious attempts to manipulate the submit-url parameter. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts. 6. Replace end-of-life or unsupported devices with newer models that receive timely security updates. 7. Conduct regular security audits and vulnerability assessments focusing on network edge devices. 8. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving router compromise. 9. Disable or restrict remote management interfaces if not strictly necessary. 10. Maintain an inventory of all D-Link devices to ensure comprehensive coverage of mitigation efforts.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-13551: Buffer Overflow in D-Link DIR-822K
Description
A vulnerability was identified in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. The affected element is an unknown function of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13551 is a buffer overflow vulnerability identified in the D-Link DIR-822K and DWR-M920 routers running specific firmware versions (1.00_20250513164613 and 1.1.50). The vulnerability resides in an unspecified function within the /boafrm/formWanConfigSetup file, where the submit-url parameter can be manipulated to overflow a buffer. This flaw allows an attacker to remotely execute arbitrary code without requiring authentication or user interaction, as the attack vector is network accessible (AV:N) and has low attack complexity (AC:L). The vulnerability impacts the confidentiality, integrity, and availability of the affected devices, potentially allowing full device compromise. Although no patch links are currently provided, the presence of a public exploit increases the urgency for mitigation. The CVSS 4.0 score of 8.7 reflects the high risk posed by this vulnerability, emphasizing the need for immediate attention. The vulnerability does not require privileges or user interaction, making it highly exploitable in real-world scenarios. The lack of segmentation or exposure of these routers to the internet could facilitate widespread exploitation. This vulnerability is particularly concerning for organizations relying on these devices for network access and security, as compromise could lead to lateral movement within networks or disruption of services.
Potential Impact
For European organizations, the impact of CVE-2025-13551 can be significant. Compromise of D-Link DIR-822K or DWR-M920 routers could lead to unauthorized remote control of network gateways, enabling attackers to intercept, modify, or disrupt network traffic. This can result in data breaches, loss of sensitive information, and disruption of business operations. Critical infrastructure sectors such as finance, healthcare, and government agencies using these devices may face increased risks of espionage, sabotage, or ransomware attacks. The vulnerability's remote exploitability without authentication means attackers can target exposed devices directly from the internet, increasing the attack surface. Additionally, the availability of a public exploit lowers the barrier for attackers, potentially leading to widespread scanning and exploitation campaigns. The integrity of network communications could be compromised, affecting trust in digital services and compliance with data protection regulations like GDPR. Organizations may also face reputational damage and financial losses due to service outages or data leaks stemming from this vulnerability.
Mitigation Recommendations
1. Immediate action should focus on obtaining and applying official firmware updates from D-Link once released to address CVE-2025-13551. 2. Until patches are available, isolate affected routers from direct internet exposure by placing them behind firewalls or VPNs to limit remote access. 3. Implement strict network segmentation to restrict lateral movement if a device is compromised. 4. Monitor network traffic for unusual activity targeting the /boafrm/formWanConfigSetup endpoint or suspicious attempts to manipulate the submit-url parameter. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts. 6. Replace end-of-life or unsupported devices with newer models that receive timely security updates. 7. Conduct regular security audits and vulnerability assessments focusing on network edge devices. 8. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving router compromise. 9. Disable or restrict remote management interfaces if not strictly necessary. 10. Maintain an inventory of all D-Link devices to ensure comprehensive coverage of mitigation efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T15:12:25.391Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69230a5f237b8255a033933a
Added to database: 11/23/2025, 1:21:35 PM
Last enriched: 11/23/2025, 1:21:49 PM
Last updated: 11/23/2025, 5:56:08 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13561: SQL Injection in SourceCodester Company Website CMS
MediumCVE-2025-54515: CWE-1284 Improper Validation of Specified Quantity in Input in AMD Versal™ Adaptive SoC Devices
LowCVE-2025-48507: CWE-1284 Improper Validation of Specified Quantity in Input in AMD Kria™ SOM
HighCVE-2025-13560: SQL Injection in SourceCodester Company Website CMS
MediumCVE-2025-13557: SQL Injection in Campcodes Online Polling System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.