Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60549: n/a

0
High
VulnerabilityCVE-2025-60549cvecve-2025-60549
Published: Fri Oct 24 2025 (10/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAutoDetecWAN_wizard4.

AI-Powered Analysis

AILast updated: 10/24/2025, 16:20:31 UTC

Technical Analysis

CVE-2025-60549 is a buffer overflow vulnerability identified in the D-Link DIR600L Ax router firmware version FW116WWb01. The flaw exists in the function formAutoDetecWAN_wizard4, where the curTime parameter is improperly handled, allowing an attacker to overflow the buffer. Buffer overflow vulnerabilities can lead to arbitrary code execution or denial of service conditions if exploited successfully. The vulnerability is triggered by sending a specially crafted request to the affected function, potentially remotely if the router's management interface is exposed. No specific affected firmware versions beyond FW116WWb01 are detailed, and no patches or public exploits are currently available. The vulnerability was reserved on 2025-09-26 and published on 2025-10-24, indicating recent discovery. The absence of a CVSS score suggests that the vulnerability has not yet been fully assessed for impact or exploitability. However, buffer overflows in network devices are typically critical due to their potential to compromise device integrity and network security. The lack of authentication requirement is not explicitly stated but is inferred given the nature of WAN auto-detection functions, which often operate without user credentials. This vulnerability poses a risk to the confidentiality, integrity, and availability of affected devices and the networks they serve.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized remote code execution on D-Link DIR600L Ax routers, resulting in network disruption, interception or manipulation of network traffic, and potential lateral movement within internal networks. The vulnerability could undermine the availability of critical network infrastructure, impacting business continuity. Confidentiality may be compromised if attackers gain control over the router and intercept sensitive communications. Integrity risks arise if attackers alter router configurations or inject malicious payloads. Small and medium enterprises, as well as home office environments using this router model, are particularly vulnerable due to typically weaker network segmentation and security controls. The absence of known exploits in the wild currently limits immediate risk, but the potential for future exploitation remains high. The impact is exacerbated in environments where firmware updates are infrequent or where network management interfaces are exposed to untrusted networks.

Mitigation Recommendations

1. Immediately inventory and identify all D-Link DIR600L Ax routers within the organization to assess exposure. 2. Restrict access to router management interfaces by implementing network segmentation and firewall rules that limit access to trusted IP addresses only. 3. Disable remote management features if not required to reduce attack surface. 4. Monitor network traffic for unusual activity targeting the curTime parameter or the WAN auto-detection functionality. 5. Engage with D-Link support channels to obtain information on forthcoming patches or firmware updates addressing this vulnerability. 6. Apply any available firmware updates promptly once released. 7. Consider deploying network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. 8. Educate IT staff on the risks and signs of exploitation related to this vulnerability. 9. For critical environments, consider temporary replacement of affected devices with alternative hardware until a patch is available. 10. Maintain robust backup and recovery procedures to mitigate potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fba47553dd06bf2048570b

Added to database: 10/24/2025, 4:08:21 PM

Last enriched: 10/24/2025, 4:20:31 PM

Last updated: 10/26/2025, 12:00:39 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats