Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60332: n/a

0
High
VulnerabilityCVE-2025-60332cvecve-2025-60332
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A NULL pointer dereference in the SetWLanRadioSettings function of D-Link DIR-823G A1 v1.0.2B05 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.

AI-Powered Analysis

AILast updated: 10/29/2025, 15:11:31 UTC

Technical Analysis

CVE-2025-60332 is a vulnerability identified in the D-Link DIR-823G A1 router firmware version 1.0.2B05. The flaw stems from a NULL pointer dereference in the SetWLanRadioSettings function, which is part of the router's web management interface. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the device, which does not require any authentication or user interaction, making it remotely exploitable over the network. The NULL pointer dereference leads to a denial of service condition, causing the router to crash or reboot, thereby disrupting network connectivity. The vulnerability is classified under CWE-476 (NULL Pointer Dereference), indicating improper handling of null pointers in code. The CVSS v3.1 base score is 7.5, reflecting high severity due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches or firmware updates have been published yet, and there are no known exploits in the wild. This vulnerability could be leveraged by attackers to cause widespread denial of service in networks relying on this router model, especially in environments where these devices serve as critical network gateways or wireless access points.

Potential Impact

For European organizations, the primary impact of CVE-2025-60332 is the potential disruption of network services due to router crashes or reboots. This can lead to loss of internet connectivity, interruption of business operations, and degraded productivity. Organizations relying on the D-Link DIR-823G A1 as part of their network infrastructure, including small and medium enterprises or branch offices, may experience outages affecting internal communications and access to cloud services. Critical sectors such as healthcare, finance, and government could face operational risks if these devices are deployed in sensitive environments. Additionally, denial of service conditions could be exploited as part of larger multi-vector attacks or to facilitate lateral movement by distracting security teams. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts from remote attackers. Although no known exploits exist yet, the vulnerability's characteristics make it a plausible target for attackers seeking to disrupt network availability.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls to limit exposure of the router's management interface to untrusted networks, including the internet. Organizations should implement firewall rules to restrict HTTP access to trusted IP addresses and segment the network to isolate critical devices. Monitoring network traffic for unusual HTTP requests targeting the SetWLanRadioSettings function or abnormal router behavior can provide early warning signs. Since no official patches are available, organizations should engage with D-Link support to obtain firmware updates or advisories. Where possible, replacing affected devices with models that have received security updates or are not vulnerable is advisable. Additionally, maintaining up-to-date inventory of network devices and their firmware versions will aid in rapid identification and response. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available can further reduce risk. Finally, educating IT staff about this vulnerability and ensuring incident response plans include scenarios involving router DoS attacks will improve organizational resilience.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8f249a2d588d2bdd990e5

Added to database: 10/22/2025, 3:03:37 PM

Last enriched: 10/29/2025, 3:11:31 PM

Last updated: 12/5/2025, 2:49:09 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats