Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60547: n/a

0
High
VulnerabilityCVE-2025-60547cvecve-2025-60547
Published: Fri Oct 24 2025 (10/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWAN_Wizard7.

AI-Powered Analysis

AILast updated: 10/24/2025, 16:21:17 UTC

Technical Analysis

CVE-2025-60547 identifies a buffer overflow vulnerability in the D-Link DIR600L Ax router firmware version FW116WWb01. The vulnerability resides in the formSetWAN_Wizard7 function, specifically triggered by the curTime parameter. Buffer overflows occur when input data exceeds the allocated memory buffer, potentially overwriting adjacent memory and allowing attackers to execute arbitrary code or crash the device. In this case, an attacker can send a specially crafted request to the router's WAN setup interface, exploiting the unchecked curTime parameter to trigger the overflow. This can lead to remote code execution or denial of service, compromising the router's integrity and availability. No CVSS score or patches are currently available, and no known exploits have been observed in the wild. The vulnerability was reserved in late September 2025 and published in October 2025. The router model affected is typically used in home or small office environments, making it a target for attackers seeking to pivot into internal networks or disrupt connectivity. The absence of authentication requirements or user interaction details is not explicitly stated, but given the nature of WAN setup functions, remote exploitation is plausible if the interface is exposed. The lack of patch links suggests that D-Link has not yet released a fix, increasing the urgency for mitigation. This vulnerability highlights the importance of secure firmware development and timely updates for network infrastructure devices.

Potential Impact

For European organizations, exploitation of this vulnerability could result in unauthorized remote code execution on affected routers, leading to full compromise of the device. This could allow attackers to intercept, modify, or redirect network traffic, undermining confidentiality and integrity of communications. Additionally, a successful attack could cause denial of service by crashing the router, impacting availability of internet connectivity critical for business operations. Small businesses and home offices using the DIR600L Ax router are particularly at risk, as these devices often lack advanced security controls and may be exposed to the internet. The compromise of these routers could serve as a foothold for lateral movement into corporate networks or as a platform for launching further attacks. Given the widespread use of D-Link routers in Europe, the potential scale of impact is significant, especially in countries with high market penetration of this model. The absence of a patch and public exploits increases the window of exposure, necessitating immediate defensive measures to prevent exploitation.

Mitigation Recommendations

1. Immediately restrict remote access to the router's management interface by disabling WAN-side administration or limiting it to trusted IP addresses. 2. Implement network segmentation to isolate routers from critical internal systems, reducing potential lateral movement. 3. Monitor network traffic for unusual requests targeting the WAN setup interface, especially those containing anomalous curTime parameter values. 4. Employ intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts targeting this vulnerability. 5. Encourage users and administrators to regularly check for firmware updates from D-Link and apply patches promptly once available. 6. Consider replacing vulnerable devices with models that receive regular security updates if patching is delayed. 7. Educate users about the risks of exposing router management interfaces to the internet and enforce strong authentication policies. 8. Maintain backups of router configurations to enable rapid recovery in case of compromise. These steps go beyond generic advice by focusing on access control, monitoring, and proactive device management specific to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fba47553dd06bf204856f7

Added to database: 10/24/2025, 4:08:21 PM

Last enriched: 10/24/2025, 4:21:17 PM

Last updated: 10/30/2025, 1:33:17 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats