CVE-2025-60332: n/a
A NULL pointer dereference in the SetWLanRadioSettings function of D-Link DIR-823G A1 v1.0.2B05 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
AI Analysis
Technical Summary
CVE-2025-60332 is a denial of service vulnerability identified in the D-Link DIR-823G A1 router firmware version 1.0.2B05. The vulnerability arises from a NULL pointer dereference in the SetWLanRadioSettings function, which is invoked when processing certain HTTP requests. An attacker can exploit this flaw by sending a specially crafted HTTP request to the router's management interface, causing the device to dereference a NULL pointer and crash. This results in a denial of service condition, disrupting network connectivity for all devices relying on the router. The vulnerability does not require authentication, meaning it can be exploited remotely by unauthenticated attackers, increasing its risk profile. No CVSS score has been assigned yet, and no public exploits have been reported, but the flaw is publicly disclosed and documented in the CVE database. The affected product is a widely used consumer and small business router model, which is common in European households and SMB environments. The lack of a patch or mitigation details at this time means organizations must rely on network-level controls and monitoring to reduce exposure. The vulnerability impacts availability primarily, with no direct confidentiality or integrity compromise reported. However, denial of service on a network gateway device can have significant operational consequences.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to network outages and loss of internet connectivity, impacting business operations, communications, and access to cloud services. Small and medium enterprises (SMEs) and home offices using the affected D-Link DIR-823G A1 routers are particularly at risk. Disruption of wireless network services can degrade productivity and may affect critical services relying on continuous connectivity. In sectors such as finance, healthcare, and manufacturing, even short-term denial of service can cause operational delays and financial losses. Additionally, repeated exploitation attempts could increase operational costs due to troubleshooting and device resets. While the vulnerability does not allow data theft or device takeover, the loss of availability can indirectly affect confidentiality and integrity by forcing fallback to less secure communication methods or delaying security updates and monitoring.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify any D-Link DIR-823G A1 routers running firmware version 1.0.2B05. Until a vendor patch is released, network administrators should restrict access to the router's management interface by limiting HTTP access to trusted internal IP addresses and blocking external HTTP requests to the router. Deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block malformed HTTP requests targeting the SetWLanRadioSettings function can reduce risk. Monitoring network traffic for unusual HTTP requests and router crashes can provide early warning of exploitation attempts. Users should subscribe to D-Link security advisories and apply firmware updates promptly once available. For critical environments, consider replacing vulnerable devices with models confirmed to be free of this vulnerability. Additionally, implementing network segmentation can limit the impact of a compromised or unavailable router on critical systems.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-60332: n/a
Description
A NULL pointer dereference in the SetWLanRadioSettings function of D-Link DIR-823G A1 v1.0.2B05 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
AI-Powered Analysis
Technical Analysis
CVE-2025-60332 is a denial of service vulnerability identified in the D-Link DIR-823G A1 router firmware version 1.0.2B05. The vulnerability arises from a NULL pointer dereference in the SetWLanRadioSettings function, which is invoked when processing certain HTTP requests. An attacker can exploit this flaw by sending a specially crafted HTTP request to the router's management interface, causing the device to dereference a NULL pointer and crash. This results in a denial of service condition, disrupting network connectivity for all devices relying on the router. The vulnerability does not require authentication, meaning it can be exploited remotely by unauthenticated attackers, increasing its risk profile. No CVSS score has been assigned yet, and no public exploits have been reported, but the flaw is publicly disclosed and documented in the CVE database. The affected product is a widely used consumer and small business router model, which is common in European households and SMB environments. The lack of a patch or mitigation details at this time means organizations must rely on network-level controls and monitoring to reduce exposure. The vulnerability impacts availability primarily, with no direct confidentiality or integrity compromise reported. However, denial of service on a network gateway device can have significant operational consequences.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to network outages and loss of internet connectivity, impacting business operations, communications, and access to cloud services. Small and medium enterprises (SMEs) and home offices using the affected D-Link DIR-823G A1 routers are particularly at risk. Disruption of wireless network services can degrade productivity and may affect critical services relying on continuous connectivity. In sectors such as finance, healthcare, and manufacturing, even short-term denial of service can cause operational delays and financial losses. Additionally, repeated exploitation attempts could increase operational costs due to troubleshooting and device resets. While the vulnerability does not allow data theft or device takeover, the loss of availability can indirectly affect confidentiality and integrity by forcing fallback to less secure communication methods or delaying security updates and monitoring.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify any D-Link DIR-823G A1 routers running firmware version 1.0.2B05. Until a vendor patch is released, network administrators should restrict access to the router's management interface by limiting HTTP access to trusted internal IP addresses and blocking external HTTP requests to the router. Deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block malformed HTTP requests targeting the SetWLanRadioSettings function can reduce risk. Monitoring network traffic for unusual HTTP requests and router crashes can provide early warning of exploitation attempts. Users should subscribe to D-Link security advisories and apply firmware updates promptly once available. For critical environments, consider replacing vulnerable devices with models confirmed to be free of this vulnerability. Additionally, implementing network segmentation can limit the impact of a compromised or unavailable router on critical systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f8f249a2d588d2bdd990e5
Added to database: 10/22/2025, 3:03:37 PM
Last enriched: 10/22/2025, 3:04:06 PM
Last updated: 10/23/2025, 10:00:32 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62498: CWE-23 in AutomationDirect Productivity Suite
HighCVE-2025-59503: CWE-918: Server-Side Request Forgery (SSRF) in Microsoft Azure Compute Resource Provider
CriticalCVE-2025-59273: CWE-284: Improper Access Control in Microsoft Azure Event Grid System
HighCVE-2025-59500: CWE-284: Improper Access Control in Microsoft Azure Notification Service
HighCVE-2025-12100: CWE-276 Incorrect Default Permissions in MongoDB BI Connector ODBC driver
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.