Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60553: n/a

0
Critical
VulnerabilityCVE-2025-60553cvecve-2025-60553
Published: Fri Oct 24 2025 (10/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWAN_Wizard52.

AI-Powered Analysis

AILast updated: 10/31/2025, 17:22:35 UTC

Technical Analysis

The vulnerability identified as CVE-2025-60553 affects the D-Link DIR600L Ax router firmware version FW116WWb01. It is a classic buffer overflow (CWE-120) occurring in the function formSetWAN_Wizard52 via the curTime parameter. Buffer overflow vulnerabilities arise when a program writes more data to a buffer than it can hold, leading to memory corruption. In this case, the overflow can be triggered remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). This means an attacker can send a specially crafted request to the vulnerable router's WAN interface, exploiting the overflow to execute arbitrary code with the highest privileges on the device. The impact includes full compromise of the router, allowing attackers to intercept, modify, or disrupt network traffic, deploy malware, or use the device as a pivot point for further attacks within the network. The CVSS score of 9.8 underscores the criticality, reflecting high confidentiality, integrity, and availability impacts. No patches are currently linked, and no exploits have been observed in the wild, but the vulnerability's nature suggests it could be weaponized quickly. The router model affected is commonly used in small to medium business and home environments, making the attack surface broad. The lack of authentication requirement and ease of exploitation make this vulnerability particularly dangerous.

Potential Impact

For European organizations, the exploitation of CVE-2025-60553 could lead to severe consequences. Compromise of network routers can result in interception of sensitive communications, unauthorized access to internal networks, and disruption of business operations due to denial of service or manipulation of network traffic. Small and medium enterprises (SMEs) and home offices using the affected D-Link DIR600L Ax routers may experience data breaches or ransomware attacks facilitated by this vulnerability. Critical infrastructure sectors relying on these devices for network connectivity could face operational disruptions or espionage risks. The widespread use of D-Link routers in Europe, especially in countries with high SME density, increases the potential impact. Additionally, attackers could leverage compromised routers to launch further attacks against connected systems, amplifying the damage. The absence of known exploits currently provides a window for mitigation, but the critical severity demands urgent attention to prevent future exploitation.

Mitigation Recommendations

1. Immediate network segmentation: Isolate affected D-Link DIR600L Ax routers from critical network segments to limit potential lateral movement. 2. Monitor network traffic for unusual patterns, especially unexpected WAN interface requests targeting the formSetWAN_Wizard52 function or anomalous curTime parameter usage. 3. Apply vendor firmware updates as soon as they become available; maintain close communication with D-Link for patch releases. 4. If patches are delayed, consider temporary replacement of vulnerable devices with alternative hardware not affected by this vulnerability. 5. Implement strict firewall rules to restrict inbound WAN traffic to trusted sources and limit exposure of router management interfaces. 6. Conduct internal audits to identify all instances of the affected router model within the organization. 7. Educate IT staff on recognizing signs of router compromise and establish incident response procedures specific to network device breaches. 8. Employ network intrusion detection systems (NIDS) tuned to detect exploitation attempts targeting this vulnerability. 9. Regularly back up router configurations and critical network data to enable rapid recovery in case of compromise. 10. Engage with cybersecurity information sharing groups to stay informed about emerging exploits or mitigation strategies related to CVE-2025-60553.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fba47553dd06bf204856fe

Added to database: 10/24/2025, 4:08:21 PM

Last enriched: 10/31/2025, 5:22:35 PM

Last updated: 12/10/2025, 3:36:02 AM

Views: 177

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats