CVE-2025-13553: Buffer Overflow in D-Link DWR-M920
A weakness has been identified in D-Link DWR-M920 1.1.50. This affects the function sub_41C7FC of the file /boafrm/formPinManageSetup. This manipulation of the argument submit-url causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-13553 is a buffer overflow vulnerability identified in the D-Link DWR-M920 router firmware version 1.1.50. The vulnerability resides in the function sub_41C7FC, specifically in the handling of the submit-url argument within the /boafrm/formPinManageSetup endpoint. By sending a specially crafted request that manipulates this argument, an attacker can overflow a buffer, potentially overwriting memory and enabling arbitrary code execution. The vulnerability is remotely exploitable without requiring authentication or user interaction, which significantly increases its risk profile. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could allow attackers to take full control of the device. Although no active exploitation has been reported in the wild, a public exploit is available, which could facilitate attacks by less skilled adversaries. The affected device, D-Link DWR-M920, is a 4G LTE router commonly used in both consumer and enterprise environments, including in European markets. The lack of an official patch at the time of publication necessitates immediate mitigation efforts to prevent exploitation. Attackers leveraging this vulnerability could disrupt network connectivity, intercept or manipulate traffic, or use the compromised device as a foothold for further attacks within organizational networks.
Potential Impact
The impact of CVE-2025-13553 on European organizations can be significant. Compromise of the D-Link DWR-M920 routers could lead to full device takeover, resulting in loss of confidentiality, integrity, and availability of network communications. This is particularly critical for organizations relying on these routers for internet connectivity or as part of their network infrastructure. Attackers could intercept sensitive data, disrupt business operations by causing network outages, or pivot to internal systems for further exploitation. Telecommunications providers and critical infrastructure operators using these devices are at heightened risk, as disruption could affect large numbers of users or critical services. The availability of a public exploit increases the likelihood of attacks, potentially targeting sectors such as government, healthcare, finance, and manufacturing across Europe. The remote and unauthenticated nature of the exploit means that attackers can launch attacks from anywhere, increasing the threat landscape. Additionally, the vulnerability could be leveraged in botnet campaigns or ransomware attacks, amplifying its impact.
Mitigation Recommendations
1. Immediate mitigation should focus on network-level controls: restrict access to the /boafrm/formPinManageSetup endpoint by implementing firewall rules or access control lists (ACLs) to block unauthorized external traffic. 2. Monitor network traffic for unusual requests targeting the submit-url parameter or the vulnerable endpoint to detect potential exploitation attempts. 3. Deploy intrusion detection/prevention systems (IDS/IPS) signatures specifically tuned to detect exploitation attempts against this vulnerability. 4. Engage with D-Link support channels to obtain firmware updates or patches as soon as they become available and prioritize their deployment. 5. If firmware updates are delayed, consider temporary device replacement or segmentation of affected routers to isolate them from critical network segments. 6. Educate network administrators about the vulnerability and ensure incident response plans include steps for handling potential exploitation. 7. Regularly audit and inventory network devices to identify all instances of the DWR-M920 model to ensure comprehensive coverage of mitigation efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-13553: Buffer Overflow in D-Link DWR-M920
Description
A weakness has been identified in D-Link DWR-M920 1.1.50. This affects the function sub_41C7FC of the file /boafrm/formPinManageSetup. This manipulation of the argument submit-url causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-13553 is a buffer overflow vulnerability identified in the D-Link DWR-M920 router firmware version 1.1.50. The vulnerability resides in the function sub_41C7FC, specifically in the handling of the submit-url argument within the /boafrm/formPinManageSetup endpoint. By sending a specially crafted request that manipulates this argument, an attacker can overflow a buffer, potentially overwriting memory and enabling arbitrary code execution. The vulnerability is remotely exploitable without requiring authentication or user interaction, which significantly increases its risk profile. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could allow attackers to take full control of the device. Although no active exploitation has been reported in the wild, a public exploit is available, which could facilitate attacks by less skilled adversaries. The affected device, D-Link DWR-M920, is a 4G LTE router commonly used in both consumer and enterprise environments, including in European markets. The lack of an official patch at the time of publication necessitates immediate mitigation efforts to prevent exploitation. Attackers leveraging this vulnerability could disrupt network connectivity, intercept or manipulate traffic, or use the compromised device as a foothold for further attacks within organizational networks.
Potential Impact
The impact of CVE-2025-13553 on European organizations can be significant. Compromise of the D-Link DWR-M920 routers could lead to full device takeover, resulting in loss of confidentiality, integrity, and availability of network communications. This is particularly critical for organizations relying on these routers for internet connectivity or as part of their network infrastructure. Attackers could intercept sensitive data, disrupt business operations by causing network outages, or pivot to internal systems for further exploitation. Telecommunications providers and critical infrastructure operators using these devices are at heightened risk, as disruption could affect large numbers of users or critical services. The availability of a public exploit increases the likelihood of attacks, potentially targeting sectors such as government, healthcare, finance, and manufacturing across Europe. The remote and unauthenticated nature of the exploit means that attackers can launch attacks from anywhere, increasing the threat landscape. Additionally, the vulnerability could be leveraged in botnet campaigns or ransomware attacks, amplifying its impact.
Mitigation Recommendations
1. Immediate mitigation should focus on network-level controls: restrict access to the /boafrm/formPinManageSetup endpoint by implementing firewall rules or access control lists (ACLs) to block unauthorized external traffic. 2. Monitor network traffic for unusual requests targeting the submit-url parameter or the vulnerable endpoint to detect potential exploitation attempts. 3. Deploy intrusion detection/prevention systems (IDS/IPS) signatures specifically tuned to detect exploitation attempts against this vulnerability. 4. Engage with D-Link support channels to obtain firmware updates or patches as soon as they become available and prioritize their deployment. 5. If firmware updates are delayed, consider temporary device replacement or segmentation of affected routers to isolate them from critical network segments. 6. Educate network administrators about the vulnerability and ensure incident response plans include steps for handling potential exploitation. 7. Regularly audit and inventory network devices to identify all instances of the DWR-M920 model to ensure comprehensive coverage of mitigation efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T15:16:33.248Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69231653c2ed1a32d9e8f9ec
Added to database: 11/23/2025, 2:12:35 PM
Last enriched: 11/23/2025, 2:19:15 PM
Last updated: 11/23/2025, 4:01:01 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13555: SQL Injection in Campcodes School File Management System
MediumCVE-2025-13552: Buffer Overflow in D-Link DIR-822K
HighCVE-2025-13551: Buffer Overflow in D-Link DIR-822K
HighCVE-2025-13550: Buffer Overflow in D-Link DIR-822K
HighCVE-2025-13549: Buffer Overflow in D-Link DIR-822K
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.