Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13553: Buffer Overflow in D-Link DWR-M920

0
High
VulnerabilityCVE-2025-13553cvecve-2025-13553
Published: Sun Nov 23 2025 (11/23/2025, 14:02:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M920

Description

A weakness has been identified in D-Link DWR-M920 1.1.50. This affects the function sub_41C7FC of the file /boafrm/formPinManageSetup. This manipulation of the argument submit-url causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 11/23/2025, 14:19:15 UTC

Technical Analysis

CVE-2025-13553 is a buffer overflow vulnerability identified in the D-Link DWR-M920 router firmware version 1.1.50. The vulnerability resides in the function sub_41C7FC, specifically in the handling of the submit-url argument within the /boafrm/formPinManageSetup endpoint. By sending a specially crafted request that manipulates this argument, an attacker can overflow a buffer, potentially overwriting memory and enabling arbitrary code execution. The vulnerability is remotely exploitable without requiring authentication or user interaction, which significantly increases its risk profile. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could allow attackers to take full control of the device. Although no active exploitation has been reported in the wild, a public exploit is available, which could facilitate attacks by less skilled adversaries. The affected device, D-Link DWR-M920, is a 4G LTE router commonly used in both consumer and enterprise environments, including in European markets. The lack of an official patch at the time of publication necessitates immediate mitigation efforts to prevent exploitation. Attackers leveraging this vulnerability could disrupt network connectivity, intercept or manipulate traffic, or use the compromised device as a foothold for further attacks within organizational networks.

Potential Impact

The impact of CVE-2025-13553 on European organizations can be significant. Compromise of the D-Link DWR-M920 routers could lead to full device takeover, resulting in loss of confidentiality, integrity, and availability of network communications. This is particularly critical for organizations relying on these routers for internet connectivity or as part of their network infrastructure. Attackers could intercept sensitive data, disrupt business operations by causing network outages, or pivot to internal systems for further exploitation. Telecommunications providers and critical infrastructure operators using these devices are at heightened risk, as disruption could affect large numbers of users or critical services. The availability of a public exploit increases the likelihood of attacks, potentially targeting sectors such as government, healthcare, finance, and manufacturing across Europe. The remote and unauthenticated nature of the exploit means that attackers can launch attacks from anywhere, increasing the threat landscape. Additionally, the vulnerability could be leveraged in botnet campaigns or ransomware attacks, amplifying its impact.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level controls: restrict access to the /boafrm/formPinManageSetup endpoint by implementing firewall rules or access control lists (ACLs) to block unauthorized external traffic. 2. Monitor network traffic for unusual requests targeting the submit-url parameter or the vulnerable endpoint to detect potential exploitation attempts. 3. Deploy intrusion detection/prevention systems (IDS/IPS) signatures specifically tuned to detect exploitation attempts against this vulnerability. 4. Engage with D-Link support channels to obtain firmware updates or patches as soon as they become available and prioritize their deployment. 5. If firmware updates are delayed, consider temporary device replacement or segmentation of affected routers to isolate them from critical network segments. 6. Educate network administrators about the vulnerability and ensure incident response plans include steps for handling potential exploitation. 7. Regularly audit and inventory network devices to identify all instances of the DWR-M920 model to ensure comprehensive coverage of mitigation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T15:16:33.248Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69231653c2ed1a32d9e8f9ec

Added to database: 11/23/2025, 2:12:35 PM

Last enriched: 11/23/2025, 2:19:15 PM

Last updated: 11/23/2025, 4:01:01 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats