CVE-2025-5623: Stack-based Buffer Overflow in D-Link DIR-816
A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-5623 is a critical stack-based buffer overflow vulnerability identified in the D-Link DIR-816 router, specifically affecting firmware version 1.10CNB05. The vulnerability resides in the qosClassifier function within the /goform/qosClassifier endpoint. It arises from improper handling and validation of the dip_address and sip_address parameters, which can be manipulated remotely by an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution, allowing an attacker to potentially take full control of the affected device without requiring authentication or user interaction. The vulnerability is remotely exploitable over the network, increasing its risk profile. Although the affected product is no longer supported by D-Link, the exploit code has been publicly disclosed, raising the likelihood of exploitation by threat actors. The CVSS v4.0 base score of 9.3 reflects the high severity, with attack vector being network-based, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The lack of vendor patches due to end-of-life status means that affected devices remain vulnerable unless mitigated by other means.
Potential Impact
For European organizations, the exploitation of CVE-2025-5623 could have significant consequences. Many small and medium enterprises (SMEs), as well as some home office environments, may still use legacy D-Link DIR-816 routers due to cost or lack of awareness. Successful exploitation could lead to full compromise of the router, allowing attackers to intercept, manipulate, or disrupt network traffic, potentially leading to data breaches, lateral movement within corporate networks, or denial of service. This is particularly critical for organizations relying on these devices as their primary network gateway or for quality of service management. The absence of vendor support and patches increases the risk of persistent exploitation. Additionally, compromised routers could be leveraged as part of botnets or for launching further attacks, impacting broader network stability and security within European infrastructure.
Mitigation Recommendations
Given the lack of official patches, European organizations should prioritize the following mitigations: 1) Immediate inventory and identification of all D-Link DIR-816 routers running version 1.10CNB05 or similar legacy firmware. 2) Replace affected devices with currently supported and patched hardware models to eliminate the vulnerability. 3) If replacement is not immediately feasible, isolate the vulnerable routers from critical network segments and restrict access to the /goform/qosClassifier endpoint via firewall rules or network segmentation. 4) Monitor network traffic for unusual patterns indicative of exploitation attempts, such as unexpected requests to the qosClassifier endpoint or anomalous outbound connections. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting this vulnerability or related exploit behaviors. 6) Educate IT staff and users about the risks of using unsupported network devices and the importance of timely hardware lifecycle management. 7) Regularly review and update network device inventories and security policies to prevent reliance on unsupported equipment.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5623: Stack-based Buffer Overflow in D-Link DIR-816
Description
A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-5623 is a critical stack-based buffer overflow vulnerability identified in the D-Link DIR-816 router, specifically affecting firmware version 1.10CNB05. The vulnerability resides in the qosClassifier function within the /goform/qosClassifier endpoint. It arises from improper handling and validation of the dip_address and sip_address parameters, which can be manipulated remotely by an attacker to overflow the stack buffer. This overflow can lead to arbitrary code execution, allowing an attacker to potentially take full control of the affected device without requiring authentication or user interaction. The vulnerability is remotely exploitable over the network, increasing its risk profile. Although the affected product is no longer supported by D-Link, the exploit code has been publicly disclosed, raising the likelihood of exploitation by threat actors. The CVSS v4.0 base score of 9.3 reflects the high severity, with attack vector being network-based, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The lack of vendor patches due to end-of-life status means that affected devices remain vulnerable unless mitigated by other means.
Potential Impact
For European organizations, the exploitation of CVE-2025-5623 could have significant consequences. Many small and medium enterprises (SMEs), as well as some home office environments, may still use legacy D-Link DIR-816 routers due to cost or lack of awareness. Successful exploitation could lead to full compromise of the router, allowing attackers to intercept, manipulate, or disrupt network traffic, potentially leading to data breaches, lateral movement within corporate networks, or denial of service. This is particularly critical for organizations relying on these devices as their primary network gateway or for quality of service management. The absence of vendor support and patches increases the risk of persistent exploitation. Additionally, compromised routers could be leveraged as part of botnets or for launching further attacks, impacting broader network stability and security within European infrastructure.
Mitigation Recommendations
Given the lack of official patches, European organizations should prioritize the following mitigations: 1) Immediate inventory and identification of all D-Link DIR-816 routers running version 1.10CNB05 or similar legacy firmware. 2) Replace affected devices with currently supported and patched hardware models to eliminate the vulnerability. 3) If replacement is not immediately feasible, isolate the vulnerable routers from critical network segments and restrict access to the /goform/qosClassifier endpoint via firewall rules or network segmentation. 4) Monitor network traffic for unusual patterns indicative of exploitation attempts, such as unexpected requests to the qosClassifier endpoint or anomalous outbound connections. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting this vulnerability or related exploit behaviors. 6) Educate IT staff and users about the risks of using unsupported network devices and the importance of timely hardware lifecycle management. 7) Regularly review and update network device inventories and security policies to prevent reliance on unsupported equipment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-04T11:10:20.298Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68418437182aa0cae2dcccb3
Added to database: 6/5/2025, 11:49:11 AM
Last enriched: 7/7/2025, 3:55:39 AM
Last updated: 8/6/2025, 3:07:10 PM
Views: 15
Related Threats
CVE-2025-8310: CWE-862 Missing Authorization in Ivanti Virtual Application Delivery ControllerCWE-862
MediumCVE-2025-8297: CWE-434 Unrestricted Upload of File with Dangerous Type in Ivanti Avalanche
HighCVE-2025-8296: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Ivanti Avalanche
HighCVE-2025-22834: CWE-665 Improper Initialization in AMI AptioV
MediumCVE-2025-22830: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in AMI AptioV
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.