Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60555: n/a

0
High
VulnerabilityCVE-2025-60555cvecve-2025-60555
Published: Fri Oct 24 2025 (10/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetWizardSelectMode.

AI-Powered Analysis

AILast updated: 10/24/2025, 16:09:15 UTC

Technical Analysis

CVE-2025-60555 is a buffer overflow vulnerability identified in the D-Link DIR600L Ax router firmware version FW116WWb01. The flaw exists in the formSetWizardSelectMode function, where the curTime parameter is improperly handled, allowing an attacker to overflow the buffer. Buffer overflows can lead to arbitrary code execution or cause the device to crash, resulting in denial of service. This vulnerability is particularly concerning because routers are critical network infrastructure devices that manage traffic and security boundaries. Exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, or disrupt network availability. Although no CVSS score or known exploits have been published yet, the nature of the vulnerability suggests it could be exploited remotely if the router's management interface is exposed or accessible within the network. The lack of authentication requirement or user interaction details is not specified, but typically such router vulnerabilities can be exploited remotely if the attacker can reach the vulnerable interface. No patches or mitigation links have been published at this time, indicating that affected users should monitor vendor advisories closely. The vulnerability was reserved in late September 2025 and published in October 2025, indicating recent discovery. Given the widespread use of D-Link routers in home and small office environments, this vulnerability poses a significant risk to network security and stability.

Potential Impact

For European organizations, exploitation of CVE-2025-60555 could lead to unauthorized control over network routers, resulting in interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within corporate networks. Small and medium enterprises using the affected D-Link DIR600L Ax model may experience network outages or breaches, impacting business continuity and data confidentiality. The vulnerability could also be leveraged as a foothold for further attacks, including ransomware or espionage campaigns. Given the critical role of routers in network infrastructure, successful exploitation could degrade trust in network security and increase operational costs due to incident response and remediation. The impact is more pronounced in organizations lacking robust network segmentation or those exposing router management interfaces to untrusted networks. Additionally, the absence of a patch at the time of disclosure increases the window of exposure, emphasizing the need for immediate compensating controls.

Mitigation Recommendations

1. Inventory and identify all D-Link DIR600L Ax routers running firmware FW116WWb01 within the organization. 2. Monitor D-Link vendor communications and security advisories for official patches or firmware updates addressing this vulnerability and apply them promptly. 3. Restrict access to router management interfaces by implementing network segmentation and firewall rules limiting access to trusted administrators only. 4. Disable remote management features if not required to reduce exposure to external attackers. 5. Employ network intrusion detection systems (NIDS) to detect anomalous traffic patterns or exploitation attempts targeting the curTime parameter or related router functions. 6. Conduct regular security audits and vulnerability scans to identify unpatched devices. 7. Educate network administrators on the risks and signs of exploitation related to this vulnerability. 8. Consider temporary replacement or isolation of vulnerable devices in critical network segments until patches are available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fba0f053dd06bf2042551d

Added to database: 10/24/2025, 3:53:20 PM

Last enriched: 10/24/2025, 4:09:15 PM

Last updated: 10/25/2025, 10:50:43 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats