Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60561: n/a

0
High
VulnerabilityCVE-2025-60561cvecve-2025-60561
Published: Fri Oct 24 2025 (10/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEmail.

AI-Powered Analysis

AILast updated: 10/24/2025, 16:26:05 UTC

Technical Analysis

CVE-2025-60561 identifies a buffer overflow vulnerability in the D-Link DIR600L Ax router firmware version FW116WWb01. The vulnerability resides in the formSetEmail function, where improper handling of the curTime parameter allows an attacker to overflow a buffer. This is classified under CWE-121 (Stack-based Buffer Overflow), which typically enables attackers to overwrite memory, potentially causing crashes or denial of service. The vulnerability is remotely exploitable over the network without any authentication or user interaction, as indicated by the CVSS vector AV:N/AC:L/PR:N/UI:N. The impact is primarily on availability (A:H), with no direct confidentiality or integrity effects reported. The CVSS score of 7.5 reflects a high severity due to the ease of exploitation and the potential to disrupt router functionality. No patches or fixes have been released at the time of publication, and no exploits have been observed in the wild. The router model affected is commonly used in home and small office environments, making it a target for attackers aiming to disrupt network connectivity or launch further attacks from compromised devices. The lack of authentication requirement increases the risk of automated exploitation attempts. Given the critical role routers play in network infrastructure, successful exploitation could lead to significant operational impact.

Potential Impact

For European organizations, the primary impact of CVE-2025-60561 is the potential disruption of network availability due to denial of service conditions caused by the buffer overflow. This can interrupt business operations, degrade productivity, and potentially expose networks to secondary attacks if attackers leverage the disruption to gain further access. Since the vulnerability does not affect confidentiality or integrity directly, data breaches are less likely from this flaw alone. However, the affected router is often a gateway device, and its compromise could indirectly facilitate lateral movement or man-in-the-middle attacks. Small and medium enterprises, as well as home offices relying on the D-Link DIR600L Ax router, are particularly vulnerable. The absence of authentication and user interaction requirements means attackers can scan and exploit vulnerable devices remotely, increasing the threat surface. The lack of available patches exacerbates the risk, leaving organizations exposed until a fix is released or mitigations are applied.

Mitigation Recommendations

1. Immediately restrict remote access to the router’s management interface by disabling WAN-side administration or applying strict firewall rules to limit access to trusted IPs only. 2. Segment the network to isolate the router management interface from general user networks, reducing exposure to potential attackers. 3. Monitor network traffic for unusual or malformed requests targeting the formSetEmail function or the curTime parameter, which may indicate exploitation attempts. 4. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect buffer overflow attempts against this router model. 5. Regularly check for firmware updates from D-Link and apply patches promptly once available. 6. Consider replacing vulnerable devices with models that have a better security track record if immediate patching is not feasible. 7. Educate IT staff and users about the risks of exposing router management interfaces and encourage secure configuration practices. 8. Use network access control (NAC) to limit device connectivity and reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fba6ca44c617250775a793

Added to database: 10/24/2025, 4:18:18 PM

Last enriched: 10/24/2025, 4:26:05 PM

Last updated: 10/25/2025, 5:09:24 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats