CVE-2025-60555: n/a
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWizardSelectMode.
AI Analysis
Technical Summary
CVE-2025-60555 is a buffer overflow vulnerability identified in the D-Link DIR600L Ax router firmware version FW116WWb01. The issue resides in the formSetWizardSelectMode function, specifically through improper handling of the curTime parameter. This parameter can be manipulated to overflow a buffer, leading to memory corruption and ultimately causing the device to crash or reboot unexpectedly. The vulnerability is remotely exploitable without any authentication or user interaction, as the affected function is accessible via the router’s web management interface or potentially other exposed services. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the network attack vector, low attack complexity, and no privileges or user interaction required. The impact is limited to availability disruption (denial of service), with no direct confidentiality or integrity compromise. No patches or firmware updates have been published at the time of disclosure, and no active exploits have been reported in the wild. The underlying weakness corresponds to CWE-121 (Stack-based Buffer Overflow), a common and dangerous vulnerability type that can lead to crashes or potentially more severe exploitation if combined with other flaws. Organizations using this router model should be aware of the risk of service interruptions and potential exploitation attempts targeting this vulnerability.
Potential Impact
For European organizations, the primary impact of CVE-2025-60555 is the potential for denial of service on affected D-Link DIR600L Ax routers. This can disrupt network connectivity, impacting business operations, especially for small and medium enterprises or branch offices relying on these consumer-grade routers for internet access or VPN connectivity. Critical infrastructure or public sector entities using these devices may experience outages affecting service availability. Although the vulnerability does not directly compromise data confidentiality or integrity, repeated or targeted exploitation could cause significant operational disruption. The lack of authentication requirement and ease of remote exploitation increase the risk of automated attacks or scanning campaigns. The absence of known exploits in the wild currently limits immediate risk, but the high CVSS score and public disclosure may attract attackers. Organizations should consider the potential for cascading effects if these routers serve as gateways to more sensitive internal networks.
Mitigation Recommendations
1. Immediately restrict remote access to the router’s management interface by disabling WAN-side administration or applying strict firewall rules to limit access to trusted IP addresses only. 2. Monitor D-Link’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 3. Where possible, replace affected D-Link DIR600L Ax routers with models from vendors with a stronger security track record or enterprise-grade devices that receive timely security updates. 4. Implement network segmentation to isolate vulnerable routers from critical internal systems, minimizing the impact of potential denial of service. 5. Deploy network intrusion detection systems (NIDS) to monitor for unusual traffic patterns or exploitation attempts targeting the curTime parameter or related router management endpoints. 6. Educate IT staff about this vulnerability and encourage proactive vulnerability scanning of network devices to identify affected hardware. 7. Maintain regular backups of router configurations to enable rapid recovery in case of device failure due to exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-60555: n/a
Description
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWizardSelectMode.
AI-Powered Analysis
Technical Analysis
CVE-2025-60555 is a buffer overflow vulnerability identified in the D-Link DIR600L Ax router firmware version FW116WWb01. The issue resides in the formSetWizardSelectMode function, specifically through improper handling of the curTime parameter. This parameter can be manipulated to overflow a buffer, leading to memory corruption and ultimately causing the device to crash or reboot unexpectedly. The vulnerability is remotely exploitable without any authentication or user interaction, as the affected function is accessible via the router’s web management interface or potentially other exposed services. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the network attack vector, low attack complexity, and no privileges or user interaction required. The impact is limited to availability disruption (denial of service), with no direct confidentiality or integrity compromise. No patches or firmware updates have been published at the time of disclosure, and no active exploits have been reported in the wild. The underlying weakness corresponds to CWE-121 (Stack-based Buffer Overflow), a common and dangerous vulnerability type that can lead to crashes or potentially more severe exploitation if combined with other flaws. Organizations using this router model should be aware of the risk of service interruptions and potential exploitation attempts targeting this vulnerability.
Potential Impact
For European organizations, the primary impact of CVE-2025-60555 is the potential for denial of service on affected D-Link DIR600L Ax routers. This can disrupt network connectivity, impacting business operations, especially for small and medium enterprises or branch offices relying on these consumer-grade routers for internet access or VPN connectivity. Critical infrastructure or public sector entities using these devices may experience outages affecting service availability. Although the vulnerability does not directly compromise data confidentiality or integrity, repeated or targeted exploitation could cause significant operational disruption. The lack of authentication requirement and ease of remote exploitation increase the risk of automated attacks or scanning campaigns. The absence of known exploits in the wild currently limits immediate risk, but the high CVSS score and public disclosure may attract attackers. Organizations should consider the potential for cascading effects if these routers serve as gateways to more sensitive internal networks.
Mitigation Recommendations
1. Immediately restrict remote access to the router’s management interface by disabling WAN-side administration or applying strict firewall rules to limit access to trusted IP addresses only. 2. Monitor D-Link’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 3. Where possible, replace affected D-Link DIR600L Ax routers with models from vendors with a stronger security track record or enterprise-grade devices that receive timely security updates. 4. Implement network segmentation to isolate vulnerable routers from critical internal systems, minimizing the impact of potential denial of service. 5. Deploy network intrusion detection systems (NIDS) to monitor for unusual traffic patterns or exploitation attempts targeting the curTime parameter or related router management endpoints. 6. Educate IT staff about this vulnerability and encourage proactive vulnerability scanning of network devices to identify affected hardware. 7. Maintain regular backups of router configurations to enable rapid recovery in case of device failure due to exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fba0f053dd06bf2042551d
Added to database: 10/24/2025, 3:53:20 PM
Last enriched: 10/31/2025, 4:37:32 PM
Last updated: 12/7/2025, 11:27:10 AM
Views: 147
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14188: Command Injection in UGREEN DH2100+
HighCVE-2025-14187: Buffer Overflow in UGREEN DH2100+
HighCVE-2025-14186: Basic Cross Site Scripting in Grandstream GXP1625
MediumCVE-2025-14185: SQL Injection in Yonyou U8 Cloud
MediumCVE-2025-14184: Command Injection in SGAI Space1 NAS N1211DS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.