Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15189: Buffer Overflow in D-Link DWR-M920

0
High
VulnerabilityCVE-2025-15189cvecve-2025-15189
Published: Mon Dec 29 2025 (12/29/2025, 13:02:11 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M920

Description

A vulnerability was identified in D-Link DWR-M920 up to 1.1.50. This issue affects the function sub_464794 of the file /boafrm/formDefRoute. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:53:48 UTC

Technical Analysis

The vulnerability CVE-2025-15189 affects the D-Link DWR-M920 router series up to firmware version 1.1.50. It is a buffer overflow issue located in the function sub_464794 of the /boafrm/formDefRoute file. The vulnerability arises when an attacker remotely manipulates the 'submit-url' parameter, causing a buffer overflow condition. This can lead to arbitrary code execution, potentially allowing attackers to take full control of the device, disrupt network services, or intercept sensitive data. The vulnerability requires no user interaction and no prior authentication, making it exploitable over the network by any remote attacker. The CVSS 4.0 score of 8.7 indicates a high-severity issue with network attack vector, low complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability with high scope and impact. Although no active exploitation has been reported, a public exploit exists, increasing the urgency for mitigation. The DWR-M920 is commonly used in small to medium business and home office environments, which may serve as entry points into larger organizational networks if compromised. The lack of an official patch link suggests that vendors or users should monitor for firmware updates or apply interim mitigations.

Potential Impact

European organizations using the D-Link DWR-M920 routers are at significant risk due to this vulnerability. Exploitation can lead to complete compromise of the affected devices, enabling attackers to intercept or manipulate network traffic, disrupt internet connectivity, or use the compromised routers as footholds for lateral movement within corporate networks. This is particularly critical for sectors such as finance, healthcare, government, and critical infrastructure where network reliability and data confidentiality are paramount. The vulnerability's remote exploitability without authentication increases the attack surface, especially in environments where these routers are exposed directly to the internet or poorly segmented networks. The availability of a public exploit raises the likelihood of opportunistic attacks and automated scanning campaigns targeting vulnerable devices. This could lead to widespread service disruptions and data breaches across European enterprises and service providers relying on these routers.

Mitigation Recommendations

1. Immediately inventory all D-Link DWR-M920 devices within the organization and identify firmware versions. 2. Monitor D-Link official channels for firmware updates addressing CVE-2025-15189 and apply patches promptly once available. 3. Until patches are released, restrict remote access to the router management interface by implementing firewall rules to block external access to the /boafrm/formDefRoute endpoint. 4. Employ network segmentation to isolate vulnerable routers from critical internal networks and sensitive data stores. 5. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts targeting the 'submit-url' parameter. 6. Conduct regular network traffic analysis to identify anomalous requests or patterns indicative of exploitation attempts. 7. Educate IT staff on the vulnerability and ensure incident response plans include steps for rapid containment and remediation. 8. Consider temporary replacement of vulnerable devices with alternative hardware if patching is delayed or infeasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-28T09:09:56.335Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450bfdb813ff03e2bfc1e

Added to database: 12/30/2025, 10:22:55 PM

Last enriched: 12/30/2025, 11:53:48 PM

Last updated: 2/4/2026, 5:32:01 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats