CVE-2025-13553: Buffer Overflow in D-Link DWR-M920
A weakness has been identified in D-Link DWR-M920 1.1.50. This affects the function sub_41C7FC of the file /boafrm/formPinManageSetup. This manipulation of the argument submit-url causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-13553 identifies a critical buffer overflow vulnerability in the D-Link DWR-M920 router firmware version 1.1.50. The vulnerability resides in the function sub_41C7FC, specifically in the handling of the submit-url parameter within the /boafrm/formPinManageSetup endpoint. By crafting a malicious request that manipulates this argument, an attacker can overflow the buffer, potentially overwriting memory and enabling arbitrary code execution. The attack vector is remote network access, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The CVSS 4.0 base score of 8.7 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could allow full control over the device. The vulnerability does not require user interaction and has low attack complexity, making it a critical risk for exposed devices. Although no active exploitation has been reported, the public availability of an exploit increases the urgency for mitigation. The DWR-M920 is commonly deployed in small to medium enterprise and home office environments, where compromise could lead to network infiltration, data interception, or disruption of internet connectivity. The lack of an official patch at the time of disclosure necessitates interim defensive measures to reduce exposure.
Potential Impact
For European organizations, this vulnerability poses a significant threat to network security and operational continuity. Compromise of DWR-M920 routers could allow attackers to gain persistent footholds within internal networks, intercept or manipulate sensitive communications, and disrupt internet access. This is particularly concerning for sectors relying on these devices for critical connectivity, such as small businesses, remote offices, and certain public institutions. The potential for remote exploitation without authentication means attackers can scan for vulnerable devices across Europe and launch automated attacks. Confidentiality breaches could expose sensitive corporate or personal data, while integrity violations might allow attackers to alter network traffic or configurations. Availability impacts could result in denial of service, affecting business operations. Given the router’s role as a network gateway, successful exploitation could facilitate lateral movement to other internal systems, amplifying the overall risk.
Mitigation Recommendations
1. Immediate mitigation involves isolating affected DWR-M920 devices from untrusted networks and restricting remote access to management interfaces. 2. Monitor network traffic for unusual requests targeting /boafrm/formPinManageSetup or anomalous submit-url parameters. 3. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of this vulnerability. 4. Implement strict firewall rules to limit inbound traffic to trusted sources only. 5. Regularly audit router firmware versions and configurations to identify and inventory vulnerable devices. 6. Coordinate with D-Link for timely release and deployment of official firmware patches addressing CVE-2025-13553. 7. Until patches are available, consider deploying compensating controls such as VPNs for remote management and disabling unnecessary services on the router. 8. Educate IT staff on the vulnerability details and encourage proactive scanning for exploit attempts. 9. Maintain backups of router configurations to enable rapid recovery if compromise occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-13553: Buffer Overflow in D-Link DWR-M920
Description
A weakness has been identified in D-Link DWR-M920 1.1.50. This affects the function sub_41C7FC of the file /boafrm/formPinManageSetup. This manipulation of the argument submit-url causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-13553 identifies a critical buffer overflow vulnerability in the D-Link DWR-M920 router firmware version 1.1.50. The vulnerability resides in the function sub_41C7FC, specifically in the handling of the submit-url parameter within the /boafrm/formPinManageSetup endpoint. By crafting a malicious request that manipulates this argument, an attacker can overflow the buffer, potentially overwriting memory and enabling arbitrary code execution. The attack vector is remote network access, requiring no authentication or user interaction, which significantly lowers the barrier for exploitation. The CVSS 4.0 base score of 8.7 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could allow full control over the device. The vulnerability does not require user interaction and has low attack complexity, making it a critical risk for exposed devices. Although no active exploitation has been reported, the public availability of an exploit increases the urgency for mitigation. The DWR-M920 is commonly deployed in small to medium enterprise and home office environments, where compromise could lead to network infiltration, data interception, or disruption of internet connectivity. The lack of an official patch at the time of disclosure necessitates interim defensive measures to reduce exposure.
Potential Impact
For European organizations, this vulnerability poses a significant threat to network security and operational continuity. Compromise of DWR-M920 routers could allow attackers to gain persistent footholds within internal networks, intercept or manipulate sensitive communications, and disrupt internet access. This is particularly concerning for sectors relying on these devices for critical connectivity, such as small businesses, remote offices, and certain public institutions. The potential for remote exploitation without authentication means attackers can scan for vulnerable devices across Europe and launch automated attacks. Confidentiality breaches could expose sensitive corporate or personal data, while integrity violations might allow attackers to alter network traffic or configurations. Availability impacts could result in denial of service, affecting business operations. Given the router’s role as a network gateway, successful exploitation could facilitate lateral movement to other internal systems, amplifying the overall risk.
Mitigation Recommendations
1. Immediate mitigation involves isolating affected DWR-M920 devices from untrusted networks and restricting remote access to management interfaces. 2. Monitor network traffic for unusual requests targeting /boafrm/formPinManageSetup or anomalous submit-url parameters. 3. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of this vulnerability. 4. Implement strict firewall rules to limit inbound traffic to trusted sources only. 5. Regularly audit router firmware versions and configurations to identify and inventory vulnerable devices. 6. Coordinate with D-Link for timely release and deployment of official firmware patches addressing CVE-2025-13553. 7. Until patches are available, consider deploying compensating controls such as VPNs for remote management and disabling unnecessary services on the router. 8. Educate IT staff on the vulnerability details and encourage proactive scanning for exploit attempts. 9. Maintain backups of router configurations to enable rapid recovery if compromise occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T15:16:33.248Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69231653c2ed1a32d9e8f9ec
Added to database: 11/23/2025, 2:12:35 PM
Last enriched: 11/30/2025, 2:59:06 PM
Last updated: 1/8/2026, 2:30:39 PM
Views: 99
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21895: CWE-703: Improper Check or Handling of Exceptional Conditions in RustCrypto RSA
LowCVE-2025-8307: CWE-257 Storing Passwords in a Recoverable Format in Asseco InfoMedica Plus
MediumCVE-2025-8306: CWE-1220 Insufficient Granularity of Access Control in Asseco InfoMedica Plus
MediumCVE-2025-14025: Incorrect Execution-Assigned Permissions in Red Hat Red Hat Ansible Automation Platform 2
HighCVE-2026-21891: CWE-287: Improper Authentication in IceWhaleTech ZimaOS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.