CVE-2025-15189: Buffer Overflow in D-Link DWR-M920
A vulnerability was identified in D-Link DWR-M920 up to 1.1.50. This issue affects the function sub_464794 of the file /boafrm/formDefRoute. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
The vulnerability CVE-2025-15189 affects the D-Link DWR-M920 router series up to firmware version 1.1.50. It is a buffer overflow issue located in the function sub_464794 of the /boafrm/formDefRoute file. The vulnerability arises when an attacker remotely manipulates the 'submit-url' parameter, causing a buffer overflow condition. This can lead to arbitrary code execution, potentially allowing attackers to take full control of the device, disrupt network services, or intercept sensitive data. The vulnerability requires no user interaction and no prior authentication, making it exploitable over the network by any remote attacker. The CVSS 4.0 score of 8.7 indicates a high-severity issue with network attack vector, low complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability with high scope and impact. Although no active exploitation has been reported, a public exploit exists, increasing the urgency for mitigation. The DWR-M920 is commonly used in small to medium business and home office environments, which may serve as entry points into larger organizational networks if compromised. The lack of an official patch link suggests that vendors or users should monitor for firmware updates or apply interim mitigations.
Potential Impact
European organizations using the D-Link DWR-M920 routers are at significant risk due to this vulnerability. Exploitation can lead to complete compromise of the affected devices, enabling attackers to intercept or manipulate network traffic, disrupt internet connectivity, or use the compromised routers as footholds for lateral movement within corporate networks. This is particularly critical for sectors such as finance, healthcare, government, and critical infrastructure where network reliability and data confidentiality are paramount. The vulnerability's remote exploitability without authentication increases the attack surface, especially in environments where these routers are exposed directly to the internet or poorly segmented networks. The availability of a public exploit raises the likelihood of opportunistic attacks and automated scanning campaigns targeting vulnerable devices. This could lead to widespread service disruptions and data breaches across European enterprises and service providers relying on these routers.
Mitigation Recommendations
1. Immediately inventory all D-Link DWR-M920 devices within the organization and identify firmware versions. 2. Monitor D-Link official channels for firmware updates addressing CVE-2025-15189 and apply patches promptly once available. 3. Until patches are released, restrict remote access to the router management interface by implementing firewall rules to block external access to the /boafrm/formDefRoute endpoint. 4. Employ network segmentation to isolate vulnerable routers from critical internal networks and sensitive data stores. 5. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts targeting the 'submit-url' parameter. 6. Conduct regular network traffic analysis to identify anomalous requests or patterns indicative of exploitation attempts. 7. Educate IT staff on the vulnerability and ensure incident response plans include steps for rapid containment and remediation. 8. Consider temporary replacement of vulnerable devices with alternative hardware if patching is delayed or infeasible.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-15189: Buffer Overflow in D-Link DWR-M920
Description
A vulnerability was identified in D-Link DWR-M920 up to 1.1.50. This issue affects the function sub_464794 of the file /boafrm/formDefRoute. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2025-15189 affects the D-Link DWR-M920 router series up to firmware version 1.1.50. It is a buffer overflow issue located in the function sub_464794 of the /boafrm/formDefRoute file. The vulnerability arises when an attacker remotely manipulates the 'submit-url' parameter, causing a buffer overflow condition. This can lead to arbitrary code execution, potentially allowing attackers to take full control of the device, disrupt network services, or intercept sensitive data. The vulnerability requires no user interaction and no prior authentication, making it exploitable over the network by any remote attacker. The CVSS 4.0 score of 8.7 indicates a high-severity issue with network attack vector, low complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability with high scope and impact. Although no active exploitation has been reported, a public exploit exists, increasing the urgency for mitigation. The DWR-M920 is commonly used in small to medium business and home office environments, which may serve as entry points into larger organizational networks if compromised. The lack of an official patch link suggests that vendors or users should monitor for firmware updates or apply interim mitigations.
Potential Impact
European organizations using the D-Link DWR-M920 routers are at significant risk due to this vulnerability. Exploitation can lead to complete compromise of the affected devices, enabling attackers to intercept or manipulate network traffic, disrupt internet connectivity, or use the compromised routers as footholds for lateral movement within corporate networks. This is particularly critical for sectors such as finance, healthcare, government, and critical infrastructure where network reliability and data confidentiality are paramount. The vulnerability's remote exploitability without authentication increases the attack surface, especially in environments where these routers are exposed directly to the internet or poorly segmented networks. The availability of a public exploit raises the likelihood of opportunistic attacks and automated scanning campaigns targeting vulnerable devices. This could lead to widespread service disruptions and data breaches across European enterprises and service providers relying on these routers.
Mitigation Recommendations
1. Immediately inventory all D-Link DWR-M920 devices within the organization and identify firmware versions. 2. Monitor D-Link official channels for firmware updates addressing CVE-2025-15189 and apply patches promptly once available. 3. Until patches are released, restrict remote access to the router management interface by implementing firewall rules to block external access to the /boafrm/formDefRoute endpoint. 4. Employ network segmentation to isolate vulnerable routers from critical internal networks and sensitive data stores. 5. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts targeting the 'submit-url' parameter. 6. Conduct regular network traffic analysis to identify anomalous requests or patterns indicative of exploitation attempts. 7. Educate IT staff on the vulnerability and ensure incident response plans include steps for rapid containment and remediation. 8. Consider temporary replacement of vulnerable devices with alternative hardware if patching is delayed or infeasible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-28T09:09:56.335Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450bfdb813ff03e2bfc1e
Added to database: 12/30/2025, 10:22:55 PM
Last enriched: 12/30/2025, 11:53:48 PM
Last updated: 2/4/2026, 5:32:01 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23624: CWE-384: Session Fixation in glpi-project glpi
MediumCVE-2026-22247: CWE-918: Server-Side Request Forgery (SSRF) in glpi-project glpi
MediumCVE-2026-22044: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi
MediumCVE-2026-25115: CWE-693: Protection Mechanism Failure in n8n-io n8n
CriticalCVE-2026-25056: CWE-434: Unrestricted Upload of File with Dangerous Type in n8n-io n8n
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.