Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13553: Buffer Overflow in D-Link DWR-M920

0
High
VulnerabilityCVE-2025-13553cvecve-2025-13553
Published: Sun Nov 23 2025 (11/23/2025, 14:02:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M920

Description

A weakness has been identified in D-Link DWR-M920 1.1.50. This affects the function sub_41C7FC of the file /boafrm/formPinManageSetup. This manipulation of the argument submit-url causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 11/30/2025, 14:59:06 UTC

Technical Analysis

CVE-2025-13553 identifies a critical buffer overflow vulnerability in the D-Link DWR-M920 router firmware version 1.1.50. The vulnerability resides in the function sub_41C7FC, specifically in the handling of the submit-url parameter within the /boafrm/formPinManageSetup endpoint. By crafting a malicious request that manipulates this argument, an attacker can overflow the buffer, potentially overwriting memory and enabling arbitrary code execution. The attack vector is remote network access, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The CVSS 4.0 base score of 8.7 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could allow full control over the device. The vulnerability does not require user interaction and has low attack complexity, making it a critical risk for exposed devices. Although no active exploitation has been reported, the public availability of an exploit increases the urgency for mitigation. The DWR-M920 is commonly deployed in small to medium enterprise and home office environments, where compromise could lead to network infiltration, data interception, or disruption of internet connectivity. The lack of an official patch at the time of disclosure necessitates interim defensive measures to reduce exposure.

Potential Impact

For European organizations, this vulnerability poses a significant threat to network security and operational continuity. Compromise of DWR-M920 routers could allow attackers to gain persistent footholds within internal networks, intercept or manipulate sensitive communications, and disrupt internet access. This is particularly concerning for sectors relying on these devices for critical connectivity, such as small businesses, remote offices, and certain public institutions. The potential for remote exploitation without authentication means attackers can scan for vulnerable devices across Europe and launch automated attacks. Confidentiality breaches could expose sensitive corporate or personal data, while integrity violations might allow attackers to alter network traffic or configurations. Availability impacts could result in denial of service, affecting business operations. Given the router’s role as a network gateway, successful exploitation could facilitate lateral movement to other internal systems, amplifying the overall risk.

Mitigation Recommendations

1. Immediate mitigation involves isolating affected DWR-M920 devices from untrusted networks and restricting remote access to management interfaces. 2. Monitor network traffic for unusual requests targeting /boafrm/formPinManageSetup or anomalous submit-url parameters. 3. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of this vulnerability. 4. Implement strict firewall rules to limit inbound traffic to trusted sources only. 5. Regularly audit router firmware versions and configurations to identify and inventory vulnerable devices. 6. Coordinate with D-Link for timely release and deployment of official firmware patches addressing CVE-2025-13553. 7. Until patches are available, consider deploying compensating controls such as VPNs for remote management and disabling unnecessary services on the router. 8. Educate IT staff on the vulnerability details and encourage proactive scanning for exploit attempts. 9. Maintain backups of router configurations to enable rapid recovery if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T15:16:33.248Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69231653c2ed1a32d9e8f9ec

Added to database: 11/23/2025, 2:12:35 PM

Last enriched: 11/30/2025, 2:59:06 PM

Last updated: 1/8/2026, 2:30:39 PM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats