CVE-2025-15191: Command Injection in D-Link DWR-M920
A weakness has been identified in D-Link DWR-M920 up to 1.1.50. The affected element is the function sub_4155B4 of the file /boafrm/formLtefotaUpgradeFibocom. This manipulation of the argument fota_url causes command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-15191 identifies a command injection vulnerability in the D-Link DWR-M920 LTE router series, specifically in firmware versions up to 1.1.50. The vulnerability resides in the function sub_4155B4 of the /boafrm/formLtefotaUpgradeFibocom component, where the fota_url parameter is improperly sanitized. This flaw allows an attacker to inject arbitrary commands remotely without requiring authentication or user interaction. The attack vector is network-based, exploiting the router's firmware upgrade mechanism by manipulating the URL parameter used for firmware over-the-air (FOTA) updates. Successful exploitation can lead to arbitrary code execution with the privileges of the affected process, potentially compromising the device's integrity and availability. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity, reflecting the ease of exploitation but limited scope of impact. Although no active exploitation has been reported, a public exploit exists, increasing the likelihood of future attacks. The vulnerability affects a wide range of firmware versions (1.1.0 through 1.1.50), indicating a long-standing issue. The lack of authentication and user interaction requirements makes this a significant risk for exposed devices. The router is commonly used in LTE network environments, often in small office/home office (SOHO) or remote connectivity scenarios, making it a critical point of failure if compromised.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized remote code execution on D-Link DWR-M920 routers, potentially leading to full device compromise. This can result in disruption of internet connectivity, interception or manipulation of network traffic, and use of the device as a pivot point for further attacks within the network. Critical infrastructure relying on LTE connectivity, such as remote offices, industrial IoT deployments, or emergency communication setups, could face operational outages or data breaches. The medium severity score reflects moderate impact, but the ease of exploitation and lack of authentication requirements elevate the threat level. Organizations in sectors like telecommunications, manufacturing, and public services that deploy these routers are particularly vulnerable. Additionally, compromised routers could be recruited into botnets, amplifying broader cyber threats. The absence of patches at the time of reporting increases exposure, necessitating immediate mitigation efforts.
Mitigation Recommendations
1. Monitor D-Link's official channels for firmware updates addressing CVE-2025-15191 and apply patches promptly once available. 2. Restrict network access to the router's management and firmware upgrade interfaces using firewall rules or network segmentation to limit exposure to untrusted networks. 3. Disable remote management and FOTA features if not required or if alternative secure update mechanisms exist. 4. Employ intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting the vulnerable endpoint. 5. Conduct regular audits of router configurations and firmware versions across the organization to identify and remediate vulnerable devices. 6. For critical deployments, consider replacing affected routers with models not impacted by this vulnerability or with better security postures. 7. Educate network administrators about the risks of command injection vulnerabilities and the importance of timely patching and access controls. 8. Implement network anomaly detection to identify unusual command execution patterns or traffic indicative of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-15191: Command Injection in D-Link DWR-M920
Description
A weakness has been identified in D-Link DWR-M920 up to 1.1.50. The affected element is the function sub_4155B4 of the file /boafrm/formLtefotaUpgradeFibocom. This manipulation of the argument fota_url causes command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-15191 identifies a command injection vulnerability in the D-Link DWR-M920 LTE router series, specifically in firmware versions up to 1.1.50. The vulnerability resides in the function sub_4155B4 of the /boafrm/formLtefotaUpgradeFibocom component, where the fota_url parameter is improperly sanitized. This flaw allows an attacker to inject arbitrary commands remotely without requiring authentication or user interaction. The attack vector is network-based, exploiting the router's firmware upgrade mechanism by manipulating the URL parameter used for firmware over-the-air (FOTA) updates. Successful exploitation can lead to arbitrary code execution with the privileges of the affected process, potentially compromising the device's integrity and availability. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity, reflecting the ease of exploitation but limited scope of impact. Although no active exploitation has been reported, a public exploit exists, increasing the likelihood of future attacks. The vulnerability affects a wide range of firmware versions (1.1.0 through 1.1.50), indicating a long-standing issue. The lack of authentication and user interaction requirements makes this a significant risk for exposed devices. The router is commonly used in LTE network environments, often in small office/home office (SOHO) or remote connectivity scenarios, making it a critical point of failure if compromised.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized remote code execution on D-Link DWR-M920 routers, potentially leading to full device compromise. This can result in disruption of internet connectivity, interception or manipulation of network traffic, and use of the device as a pivot point for further attacks within the network. Critical infrastructure relying on LTE connectivity, such as remote offices, industrial IoT deployments, or emergency communication setups, could face operational outages or data breaches. The medium severity score reflects moderate impact, but the ease of exploitation and lack of authentication requirements elevate the threat level. Organizations in sectors like telecommunications, manufacturing, and public services that deploy these routers are particularly vulnerable. Additionally, compromised routers could be recruited into botnets, amplifying broader cyber threats. The absence of patches at the time of reporting increases exposure, necessitating immediate mitigation efforts.
Mitigation Recommendations
1. Monitor D-Link's official channels for firmware updates addressing CVE-2025-15191 and apply patches promptly once available. 2. Restrict network access to the router's management and firmware upgrade interfaces using firewall rules or network segmentation to limit exposure to untrusted networks. 3. Disable remote management and FOTA features if not required or if alternative secure update mechanisms exist. 4. Employ intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting the vulnerable endpoint. 5. Conduct regular audits of router configurations and firmware versions across the organization to identify and remediate vulnerable devices. 6. For critical deployments, consider replacing affected routers with models not impacted by this vulnerability or with better security postures. 7. Educate network administrators about the risks of command injection vulnerabilities and the importance of timely patching and access controls. 8. Implement network anomaly detection to identify unusual command execution patterns or traffic indicative of exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-28T09:10:09.118Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450bddb813ff03e2bf8d0
Added to database: 12/30/2025, 10:22:53 PM
Last enriched: 12/30/2025, 11:49:52 PM
Last updated: 2/4/2026, 10:36:31 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41085: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Apidog Apidog Web Platform
MediumDetecting and Monitoring OpenClaw (clawdbot, moltbot), (Tue, Feb 3rd)
MediumMalicious Script Delivering More Maliciousness, (Wed, Feb 4th)
MediumEclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
MediumMicrosoft Warns Python Infostealers Target macOS via Fake Ads and Installers
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.