Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13552: Buffer Overflow in D-Link DIR-822K

0
High
VulnerabilityCVE-2025-13552cvecve-2025-13552
Published: Sun Nov 23 2025 (11/23/2025, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-822K

Description

A security flaw has been discovered in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. The impacted element is an unknown function of the file /boafrm/formWlEncrypt. The manipulation of the argument submit-url results in buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 11/23/2025, 13:59:37 UTC

Technical Analysis

CVE-2025-13552 is a buffer overflow vulnerability identified in the D-Link DIR-822K and DWR-M920 routers, specifically affecting firmware versions 1.00_20250513164613 and 1.1.50. The vulnerability resides in an unspecified function associated with the /boafrm/formWlEncrypt endpoint, where the submit-url argument can be manipulated to cause a buffer overflow condition. This flaw can be exploited remotely by an unauthenticated attacker without requiring user interaction, making it highly accessible for exploitation. The buffer overflow potentially allows an attacker to execute arbitrary code on the device, leading to full compromise of the router. This can result in unauthorized access to network traffic, disruption of network services, and the establishment of persistent footholds within the affected network. Although no active exploitation in the wild has been reported, a public exploit has been released, increasing the urgency for mitigation. The vulnerability has been assigned a CVSS 4.0 base score of 8.7, indicating high severity due to its network attack vector, low complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. The absence of official patches at the time of disclosure necessitates immediate defensive measures to reduce exposure. Given the widespread use of D-Link routers in home and small business environments, this vulnerability poses a significant threat to network security and privacy.

Potential Impact

For European organizations, this vulnerability presents a critical risk to network infrastructure security. Exploitation could lead to remote code execution on routers, enabling attackers to intercept or manipulate sensitive data, disrupt internet connectivity, or pivot to internal networks for further attacks. This is particularly concerning for small and medium enterprises (SMEs) and home office setups that commonly use D-Link DIR-822K and DWR-M920 devices due to their affordability and availability. Compromise of these routers could facilitate espionage, data theft, ransomware deployment, or denial of service attacks. Additionally, critical sectors such as healthcare, finance, and government agencies relying on these devices for connectivity may face operational disruptions and data breaches. The public availability of an exploit increases the likelihood of opportunistic attacks, making timely mitigation essential to prevent widespread impact across European networks.

Mitigation Recommendations

1. Monitor D-Link’s official channels for firmware updates addressing CVE-2025-13552 and apply patches immediately upon release. 2. Until patches are available, restrict remote access to router management interfaces by disabling WAN-side administration and limiting access to trusted IP addresses. 3. Implement network segmentation to isolate vulnerable routers from critical systems and sensitive data. 4. Deploy intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting /boafrm/formWlEncrypt or unusual submit-url parameters. 5. Conduct regular network traffic analysis to detect anomalous behavior indicative of exploitation attempts. 6. Educate users and administrators about the risks and signs of router compromise. 7. Consider replacing affected devices with models that have confirmed security updates if patching is delayed. 8. Employ strong authentication and change default credentials to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T15:12:35.362Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69230fc6237b8255a0386f87

Added to database: 11/23/2025, 1:44:38 PM

Last enriched: 11/23/2025, 1:59:37 PM

Last updated: 11/23/2025, 7:18:19 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats