Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60548: n/a

0
Critical
VulnerabilityCVE-2025-60548cvecve-2025-60548
Published: Fri Oct 24 2025 (10/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formLanSetupRouterSettings.

AI-Powered Analysis

AILast updated: 10/31/2025, 17:22:11 UTC

Technical Analysis

CVE-2025-60548 is a critical security vulnerability identified in the D-Link DIR600L Ax router firmware version FW116WWb01. The flaw is a classic buffer overflow (CWE-120) triggered by the curTime parameter within the formLanSetupRouterSettings function. Buffer overflows occur when input data exceeds the allocated buffer size, overwriting adjacent memory and enabling attackers to manipulate program execution flow. In this case, the vulnerability can be exploited remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to arbitrary code execution with the highest privileges on the router, compromising confidentiality, integrity, and availability of the device and potentially the entire network it serves. The router’s firmware does not currently have a patch available, and no known exploits have been observed in the wild yet. However, the high CVSS score of 9.8 underscores the critical risk posed by this vulnerability. The router is commonly used in home and small business environments, making it a valuable target for attackers seeking to establish persistent access or launch further attacks within a network. The vulnerability’s remote and unauthenticated nature significantly lowers the barrier for exploitation, increasing the urgency for mitigation.

Potential Impact

For European organizations, especially small and medium enterprises and residential users relying on the D-Link DIR600L Ax router, this vulnerability poses a severe risk. Exploitation could lead to full device takeover, allowing attackers to intercept, modify, or disrupt network traffic, steal sensitive data, or use the compromised router as a pivot point for lateral movement within corporate networks. This can result in data breaches, service outages, and loss of trust. The router’s role as a gateway device means that its compromise can affect the entire network’s security posture. Given the critical severity and ease of exploitation, the potential impact includes significant operational disruption and financial losses. Additionally, the lack of a current patch increases exposure time, heightening risk for European users until a firmware update is released and deployed.

Mitigation Recommendations

1. Immediate mitigation involves isolating the affected router from untrusted networks, especially the internet, to prevent remote exploitation. 2. Disable remote management interfaces or restrict access to trusted IP addresses only. 3. Monitor network traffic for unusual activity that could indicate exploitation attempts. 4. Implement network segmentation to limit the impact of a compromised device on critical systems. 5. Regularly check D-Link’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 6. Consider replacing vulnerable devices with models from vendors with a strong security update track record if patches are delayed. 7. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect buffer overflow attack patterns targeting routers. 8. Educate users and administrators about the risks and signs of router compromise to enable rapid response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fba47553dd06bf204856fb

Added to database: 10/24/2025, 4:08:21 PM

Last enriched: 10/31/2025, 5:22:11 PM

Last updated: 12/10/2025, 7:05:44 PM

Views: 159

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats