CVE-2025-13552: Buffer Overflow in D-Link DIR-822K
A security flaw has been discovered in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. The impacted element is an unknown function of the file /boafrm/formWlEncrypt. The manipulation of the argument submit-url results in buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-13552 is a buffer overflow vulnerability identified in the D-Link DIR-822K and DWR-M920 routers, specifically affecting firmware versions 1.00_20250513164613 and 1.1.50. The vulnerability resides in an unspecified function associated with the /boafrm/formWlEncrypt endpoint, where the submit-url argument can be manipulated to cause a buffer overflow condition. This flaw can be exploited remotely by an unauthenticated attacker without requiring user interaction, making it highly accessible for exploitation. The buffer overflow potentially allows an attacker to execute arbitrary code on the device, leading to full compromise of the router. This can result in unauthorized access to network traffic, disruption of network services, and the establishment of persistent footholds within the affected network. Although no active exploitation in the wild has been reported, a public exploit has been released, increasing the urgency for mitigation. The vulnerability has been assigned a CVSS 4.0 base score of 8.7, indicating high severity due to its network attack vector, low complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. The absence of official patches at the time of disclosure necessitates immediate defensive measures to reduce exposure. Given the widespread use of D-Link routers in home and small business environments, this vulnerability poses a significant threat to network security and privacy.
Potential Impact
For European organizations, this vulnerability presents a critical risk to network infrastructure security. Exploitation could lead to remote code execution on routers, enabling attackers to intercept or manipulate sensitive data, disrupt internet connectivity, or pivot to internal networks for further attacks. This is particularly concerning for small and medium enterprises (SMEs) and home office setups that commonly use D-Link DIR-822K and DWR-M920 devices due to their affordability and availability. Compromise of these routers could facilitate espionage, data theft, ransomware deployment, or denial of service attacks. Additionally, critical sectors such as healthcare, finance, and government agencies relying on these devices for connectivity may face operational disruptions and data breaches. The public availability of an exploit increases the likelihood of opportunistic attacks, making timely mitigation essential to prevent widespread impact across European networks.
Mitigation Recommendations
1. Monitor D-Link’s official channels for firmware updates addressing CVE-2025-13552 and apply patches immediately upon release. 2. Until patches are available, restrict remote access to router management interfaces by disabling WAN-side administration and limiting access to trusted IP addresses. 3. Implement network segmentation to isolate vulnerable routers from critical systems and sensitive data. 4. Deploy intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting /boafrm/formWlEncrypt or unusual submit-url parameters. 5. Conduct regular network traffic analysis to detect anomalous behavior indicative of exploitation attempts. 6. Educate users and administrators about the risks and signs of router compromise. 7. Consider replacing affected devices with models that have confirmed security updates if patching is delayed. 8. Employ strong authentication and change default credentials to reduce attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-13552: Buffer Overflow in D-Link DIR-822K
Description
A security flaw has been discovered in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. The impacted element is an unknown function of the file /boafrm/formWlEncrypt. The manipulation of the argument submit-url results in buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-13552 is a buffer overflow vulnerability identified in the D-Link DIR-822K and DWR-M920 routers, specifically affecting firmware versions 1.00_20250513164613 and 1.1.50. The vulnerability resides in an unspecified function associated with the /boafrm/formWlEncrypt endpoint, where the submit-url argument can be manipulated to cause a buffer overflow condition. This flaw can be exploited remotely by an unauthenticated attacker without requiring user interaction, making it highly accessible for exploitation. The buffer overflow potentially allows an attacker to execute arbitrary code on the device, leading to full compromise of the router. This can result in unauthorized access to network traffic, disruption of network services, and the establishment of persistent footholds within the affected network. Although no active exploitation in the wild has been reported, a public exploit has been released, increasing the urgency for mitigation. The vulnerability has been assigned a CVSS 4.0 base score of 8.7, indicating high severity due to its network attack vector, low complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. The absence of official patches at the time of disclosure necessitates immediate defensive measures to reduce exposure. Given the widespread use of D-Link routers in home and small business environments, this vulnerability poses a significant threat to network security and privacy.
Potential Impact
For European organizations, this vulnerability presents a critical risk to network infrastructure security. Exploitation could lead to remote code execution on routers, enabling attackers to intercept or manipulate sensitive data, disrupt internet connectivity, or pivot to internal networks for further attacks. This is particularly concerning for small and medium enterprises (SMEs) and home office setups that commonly use D-Link DIR-822K and DWR-M920 devices due to their affordability and availability. Compromise of these routers could facilitate espionage, data theft, ransomware deployment, or denial of service attacks. Additionally, critical sectors such as healthcare, finance, and government agencies relying on these devices for connectivity may face operational disruptions and data breaches. The public availability of an exploit increases the likelihood of opportunistic attacks, making timely mitigation essential to prevent widespread impact across European networks.
Mitigation Recommendations
1. Monitor D-Link’s official channels for firmware updates addressing CVE-2025-13552 and apply patches immediately upon release. 2. Until patches are available, restrict remote access to router management interfaces by disabling WAN-side administration and limiting access to trusted IP addresses. 3. Implement network segmentation to isolate vulnerable routers from critical systems and sensitive data. 4. Deploy intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting /boafrm/formWlEncrypt or unusual submit-url parameters. 5. Conduct regular network traffic analysis to detect anomalous behavior indicative of exploitation attempts. 6. Educate users and administrators about the risks and signs of router compromise. 7. Consider replacing affected devices with models that have confirmed security updates if patching is delayed. 8. Employ strong authentication and change default credentials to reduce attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T15:12:35.362Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69230fc6237b8255a0386f87
Added to database: 11/23/2025, 1:44:38 PM
Last enriched: 11/23/2025, 1:59:37 PM
Last updated: 11/23/2025, 7:18:19 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13565: Weak Password Recovery in SourceCodester Inventory Management System
MediumCVE-2025-13564: Denial of Service in SourceCodester Pre-School Management System
MediumCVE-2025-13562: Command Injection in D-Link DIR-852
MediumCVE-2025-13561: SQL Injection in SourceCodester Company Website CMS
MediumCVE-2025-54515: CWE-1284 Improper Validation of Specified Quantity in Input in AMD Versal™ Adaptive SoC Devices
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.