Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60558: n/a

0
High
VulnerabilityCVE-2025-60558cvecve-2025-60558
Published: Fri Oct 24 2025 (10/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formVirtualServ.

AI-Powered Analysis

AILast updated: 10/24/2025, 16:08:32 UTC

Technical Analysis

CVE-2025-60558 is a buffer overflow vulnerability identified in the D-Link DIR600L Ax router firmware version FW116WWb01. The vulnerability exists in the formVirtualServ function, where improper handling of the curTime parameter allows an attacker to overflow a buffer. Buffer overflow vulnerabilities typically enable attackers to overwrite memory, potentially leading to arbitrary code execution or denial of service conditions. This vulnerability does not require authentication or user interaction, increasing its risk profile. The lack of a CVSS score and absence of patches indicate this is a newly disclosed issue, with no public exploit code reported yet. The affected device is a consumer-grade router commonly used in home and small office environments. Exploitation could allow remote attackers to compromise the router, intercept or manipulate network traffic, or disrupt network availability. The vulnerability's presence in a widely deployed router model raises concerns about large-scale impact, especially in environments where these devices are used as primary network gateways without additional security layers.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized network access, interception of sensitive data, and disruption of network services. Small businesses and home offices relying on the D-Link DIR600L Ax router may experience compromised confidentiality and integrity of communications. The potential for remote code execution could allow attackers to pivot into internal networks, escalating the threat to enterprise environments connected through these routers. Additionally, denial of service attacks could cause operational downtime, impacting business continuity. The lack of patches increases the window of exposure, making timely mitigation critical. Given the router's role as a network gateway, successful exploitation could undermine perimeter defenses and facilitate further attacks on connected systems.

Mitigation Recommendations

1. Immediately identify and inventory all D-Link DIR600L Ax routers running firmware FW116WWb01 within the network. 2. Disable remote management interfaces (e.g., WAN-side web administration) to reduce exposure. 3. Segment networks to isolate vulnerable routers from critical infrastructure and sensitive data. 4. Monitor network traffic for unusual patterns or attempts to exploit the curTime parameter, using IDS/IPS signatures or custom detection rules. 5. Apply strict firewall rules to restrict inbound access to router management ports. 6. Engage with D-Link support channels to obtain information on forthcoming patches or firmware updates. 7. Consider replacing vulnerable devices with models confirmed to be free of this vulnerability if patching is delayed. 8. Educate users about the risks of using default credentials and encourage strong password policies. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fba0f053dd06bf20425526

Added to database: 10/24/2025, 3:53:20 PM

Last enriched: 10/24/2025, 4:08:32 PM

Last updated: 10/25/2025, 9:58:31 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats