Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60332: n/a

0
High
VulnerabilityCVE-2025-60332cvecve-2025-60332
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A NULL pointer dereference in the SetWLanRadioSettings function of D-Link DIR-823G A1 v1.0.2B05 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.

AI-Powered Analysis

AILast updated: 10/22/2025, 15:04:06 UTC

Technical Analysis

CVE-2025-60332 is a denial of service vulnerability identified in the D-Link DIR-823G A1 router firmware version 1.0.2B05. The vulnerability arises from a NULL pointer dereference in the SetWLanRadioSettings function, which is invoked when processing certain HTTP requests. An attacker can exploit this flaw by sending a specially crafted HTTP request to the router's management interface, causing the device to dereference a NULL pointer and crash. This results in a denial of service condition, disrupting network connectivity for all devices relying on the router. The vulnerability does not require authentication, meaning it can be exploited remotely by unauthenticated attackers, increasing its risk profile. No CVSS score has been assigned yet, and no public exploits have been reported, but the flaw is publicly disclosed and documented in the CVE database. The affected product is a widely used consumer and small business router model, which is common in European households and SMB environments. The lack of a patch or mitigation details at this time means organizations must rely on network-level controls and monitoring to reduce exposure. The vulnerability impacts availability primarily, with no direct confidentiality or integrity compromise reported. However, denial of service on a network gateway device can have significant operational consequences.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to network outages and loss of internet connectivity, impacting business operations, communications, and access to cloud services. Small and medium enterprises (SMEs) and home offices using the affected D-Link DIR-823G A1 routers are particularly at risk. Disruption of wireless network services can degrade productivity and may affect critical services relying on continuous connectivity. In sectors such as finance, healthcare, and manufacturing, even short-term denial of service can cause operational delays and financial losses. Additionally, repeated exploitation attempts could increase operational costs due to troubleshooting and device resets. While the vulnerability does not allow data theft or device takeover, the loss of availability can indirectly affect confidentiality and integrity by forcing fallback to less secure communication methods or delaying security updates and monitoring.

Mitigation Recommendations

Organizations should immediately inventory their network infrastructure to identify any D-Link DIR-823G A1 routers running firmware version 1.0.2B05. Until a vendor patch is released, network administrators should restrict access to the router's management interface by limiting HTTP access to trusted internal IP addresses and blocking external HTTP requests to the router. Deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block malformed HTTP requests targeting the SetWLanRadioSettings function can reduce risk. Monitoring network traffic for unusual HTTP requests and router crashes can provide early warning of exploitation attempts. Users should subscribe to D-Link security advisories and apply firmware updates promptly once available. For critical environments, consider replacing vulnerable devices with models confirmed to be free of this vulnerability. Additionally, implementing network segmentation can limit the impact of a compromised or unavailable router on critical systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8f249a2d588d2bdd990e5

Added to database: 10/22/2025, 3:03:37 PM

Last enriched: 10/22/2025, 3:04:06 PM

Last updated: 10/23/2025, 10:00:32 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats