Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60554: n/a

0
Critical
VulnerabilityCVE-2025-60554cvecve-2025-60554
Published: Fri Oct 24 2025 (10/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEnableWizard.

AI-Powered Analysis

AILast updated: 10/31/2025, 16:37:50 UTC

Technical Analysis

CVE-2025-60554 is a critical security vulnerability identified in the D-Link DIR600L Ax router firmware version FW116WWb01. The flaw is a classic buffer overflow (CWE-120) triggered by improper handling of the curTime parameter within the formSetEnableWizard function. Buffer overflows occur when input data exceeds the allocated buffer size, allowing attackers to overwrite adjacent memory, potentially leading to arbitrary code execution. This vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector AV:N/AC:L/PR:N/UI:N. The impact includes full compromise of the device’s confidentiality, integrity, and availability, enabling attackers to execute malicious code, disrupt network operations, or pivot into internal networks. Despite the high severity (CVSS 9.8), no patches or fixes have been published yet, and no known exploits are reported in the wild. The vulnerability’s presence in a widely used consumer and small business router model raises concerns about the security posture of affected networks. Attackers could leverage this flaw to gain persistent access, intercept or manipulate traffic, or launch further attacks against connected systems. The lack of authentication requirement and ease of exploitation make this a critical threat that demands immediate attention from network defenders and administrators.

Potential Impact

For European organizations, the exploitation of CVE-2025-60554 could lead to severe consequences including full compromise of network perimeter devices, loss of sensitive data, disruption of business operations, and potential lateral movement into internal networks. Given that routers like the D-Link DIR600L Ax are often deployed in small offices, home offices, and some enterprise edge environments, attackers could gain a foothold in less monitored network segments. This could facilitate espionage, ransomware deployment, or sabotage of critical infrastructure. The vulnerability’s ability to compromise confidentiality, integrity, and availability simultaneously means that organizations could face data breaches, service outages, and reputational damage. The absence of patches increases the window of exposure, making proactive mitigation essential. Additionally, regulatory compliance frameworks in Europe, such as GDPR, may impose penalties if compromised devices lead to personal data breaches. The threat is particularly acute for sectors relying on secure and stable network connectivity, including finance, healthcare, and government agencies.

Mitigation Recommendations

1. Immediately disable remote management interfaces on affected D-Link DIR600L Ax routers to reduce exposure to external attacks. 2. Segment networks to isolate vulnerable routers from critical assets and sensitive data environments. 3. Monitor network traffic for unusual patterns or attempts to exploit the curTime parameter, using IDS/IPS signatures tailored to buffer overflow attempts. 4. Apply strict firewall rules to limit inbound access to router management ports, especially from untrusted networks. 5. Regularly audit and inventory network devices to identify all instances of the affected router model. 6. Engage with D-Link support channels to obtain updates on patch availability and apply firmware updates promptly once released. 7. Consider replacing vulnerable devices with models that have confirmed security updates if patching is delayed. 8. Educate IT staff about this vulnerability and ensure incident response plans include steps for router compromise scenarios. 9. Employ network-level anomaly detection tools to identify exploitation attempts early. 10. Maintain backups of router configurations and critical network data to enable rapid recovery if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fba0f053dd06bf2042551a

Added to database: 10/24/2025, 3:53:20 PM

Last enriched: 10/31/2025, 4:37:50 PM

Last updated: 12/15/2025, 4:42:36 AM

Views: 167

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats