CVE-2025-60332: n/a
A NULL pointer dereference in the SetWLanRadioSettings function of D-Link DIR-823G A1 v1.0.2B05 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
AI Analysis
Technical Summary
CVE-2025-60332 is a vulnerability identified in the D-Link DIR-823G A1 router firmware version 1.0.2B05. The flaw stems from a NULL pointer dereference in the SetWLanRadioSettings function, which is part of the router's web management interface. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the device, which does not require any authentication or user interaction, making it remotely exploitable over the network. The NULL pointer dereference leads to a denial of service condition, causing the router to crash or reboot, thereby disrupting network connectivity. The vulnerability is classified under CWE-476 (NULL Pointer Dereference), indicating improper handling of null pointers in code. The CVSS v3.1 base score is 7.5, reflecting high severity due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches or firmware updates have been published yet, and there are no known exploits in the wild. This vulnerability could be leveraged by attackers to cause widespread denial of service in networks relying on this router model, especially in environments where these devices serve as critical network gateways or wireless access points.
Potential Impact
For European organizations, the primary impact of CVE-2025-60332 is the potential disruption of network services due to router crashes or reboots. This can lead to loss of internet connectivity, interruption of business operations, and degraded productivity. Organizations relying on the D-Link DIR-823G A1 as part of their network infrastructure, including small and medium enterprises or branch offices, may experience outages affecting internal communications and access to cloud services. Critical sectors such as healthcare, finance, and government could face operational risks if these devices are deployed in sensitive environments. Additionally, denial of service conditions could be exploited as part of larger multi-vector attacks or to facilitate lateral movement by distracting security teams. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts from remote attackers. Although no known exploits exist yet, the vulnerability's characteristics make it a plausible target for attackers seeking to disrupt network availability.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls to limit exposure of the router's management interface to untrusted networks, including the internet. Organizations should implement firewall rules to restrict HTTP access to trusted IP addresses and segment the network to isolate critical devices. Monitoring network traffic for unusual HTTP requests targeting the SetWLanRadioSettings function or abnormal router behavior can provide early warning signs. Since no official patches are available, organizations should engage with D-Link support to obtain firmware updates or advisories. Where possible, replacing affected devices with models that have received security updates or are not vulnerable is advisable. Additionally, maintaining up-to-date inventory of network devices and their firmware versions will aid in rapid identification and response. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available can further reduce risk. Finally, educating IT staff about this vulnerability and ensuring incident response plans include scenarios involving router DoS attacks will improve organizational resilience.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-60332: n/a
Description
A NULL pointer dereference in the SetWLanRadioSettings function of D-Link DIR-823G A1 v1.0.2B05 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
AI-Powered Analysis
Technical Analysis
CVE-2025-60332 is a vulnerability identified in the D-Link DIR-823G A1 router firmware version 1.0.2B05. The flaw stems from a NULL pointer dereference in the SetWLanRadioSettings function, which is part of the router's web management interface. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the device, which does not require any authentication or user interaction, making it remotely exploitable over the network. The NULL pointer dereference leads to a denial of service condition, causing the router to crash or reboot, thereby disrupting network connectivity. The vulnerability is classified under CWE-476 (NULL Pointer Dereference), indicating improper handling of null pointers in code. The CVSS v3.1 base score is 7.5, reflecting high severity due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches or firmware updates have been published yet, and there are no known exploits in the wild. This vulnerability could be leveraged by attackers to cause widespread denial of service in networks relying on this router model, especially in environments where these devices serve as critical network gateways or wireless access points.
Potential Impact
For European organizations, the primary impact of CVE-2025-60332 is the potential disruption of network services due to router crashes or reboots. This can lead to loss of internet connectivity, interruption of business operations, and degraded productivity. Organizations relying on the D-Link DIR-823G A1 as part of their network infrastructure, including small and medium enterprises or branch offices, may experience outages affecting internal communications and access to cloud services. Critical sectors such as healthcare, finance, and government could face operational risks if these devices are deployed in sensitive environments. Additionally, denial of service conditions could be exploited as part of larger multi-vector attacks or to facilitate lateral movement by distracting security teams. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts from remote attackers. Although no known exploits exist yet, the vulnerability's characteristics make it a plausible target for attackers seeking to disrupt network availability.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls to limit exposure of the router's management interface to untrusted networks, including the internet. Organizations should implement firewall rules to restrict HTTP access to trusted IP addresses and segment the network to isolate critical devices. Monitoring network traffic for unusual HTTP requests targeting the SetWLanRadioSettings function or abnormal router behavior can provide early warning signs. Since no official patches are available, organizations should engage with D-Link support to obtain firmware updates or advisories. Where possible, replacing affected devices with models that have received security updates or are not vulnerable is advisable. Additionally, maintaining up-to-date inventory of network devices and their firmware versions will aid in rapid identification and response. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available can further reduce risk. Finally, educating IT staff about this vulnerability and ensuring incident response plans include scenarios involving router DoS attacks will improve organizational resilience.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f8f249a2d588d2bdd990e5
Added to database: 10/22/2025, 3:03:37 PM
Last enriched: 10/29/2025, 3:11:31 PM
Last updated: 12/5/2025, 2:49:09 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14088: Improper Authorization in ketr JEPaaS
MediumCVE-2025-14086: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-14085: Improper Control of Dynamically-Identified Variables in youlaitech youlai-mall
MediumCVE-2025-58098: CWE-201 Insertion of Sensitive Information Into Sent Data in Apache Software Foundation Apache HTTP Server
UnknownCVE-2025-6966: CWE-476 NULL Pointer Dereference in Canonical python-apt
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.