Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60562: n/a

0
High
VulnerabilityCVE-2025-60562cvecve-2025-60562
Published: Fri Oct 24 2025 (10/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formWlSiteSurvey.

AI-Powered Analysis

AILast updated: 10/24/2025, 16:18:59 UTC

Technical Analysis

CVE-2025-60562 is a buffer overflow vulnerability identified in the D-Link DIR600L Ax router firmware version FW116WWb01. The vulnerability arises from improper handling of the curTime parameter within the formWlSiteSurvey function, which is likely part of the router’s wireless site survey feature. Buffer overflow vulnerabilities (CWE-121) occur when input data exceeds the allocated buffer size, potentially overwriting adjacent memory and causing undefined behavior. In this case, the flaw can be triggered remotely over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Exploiting this vulnerability does not compromise confidentiality or integrity but results in a high impact on availability by causing the device to crash or reboot, effectively leading to denial of service (DoS). Although no known exploits are currently reported in the wild, the vulnerability’s presence in a widely deployed consumer and small business router model poses a significant risk. The absence of patches or mitigation guidance from the vendor at this time increases exposure. Attackers could leverage this flaw to disrupt network connectivity, degrade service availability, or create a foothold for further attacks if combined with other vulnerabilities. The vulnerability was reserved on 2025-09-26 and published on 2025-10-24, indicating recent discovery and disclosure. The router’s role as a network gateway makes this vulnerability particularly impactful, as it can affect all devices downstream from the compromised router.

Potential Impact

For European organizations, the primary impact of CVE-2025-60562 is the potential for denial of service on networks relying on the D-Link DIR600L Ax router. This can disrupt business operations, especially for small and medium enterprises or branch offices using this device as their main internet gateway. Critical infrastructure sectors, such as healthcare, finance, and public services, could experience interruptions if these routers are deployed in their networks. The lack of confidentiality or integrity compromise limits the risk of data breaches directly from this vulnerability; however, availability loss can indirectly affect organizational productivity and service delivery. Additionally, network outages caused by router crashes can hinder incident response and recovery efforts during concurrent cyberattacks. The vulnerability’s remote and unauthenticated exploitability increases the attack surface, allowing threat actors to launch attacks from anywhere on the internet. European organizations with limited IT security resources may be disproportionately affected due to slower patch adoption and detection capabilities.

Mitigation Recommendations

1. Immediate mitigation involves network segmentation to isolate vulnerable routers from critical assets and limit exposure to untrusted networks. 2. Monitor network traffic for unusual or malformed requests targeting the formWlSiteSurvey function or the curTime parameter, using IDS/IPS signatures or custom detection rules. 3. Implement strict firewall rules to restrict inbound access to router management interfaces and services from untrusted sources. 4. Regularly check for firmware updates or security advisories from D-Link and apply patches promptly once available. 5. Consider replacing vulnerable devices with models that have active security support and better vulnerability management. 6. Maintain comprehensive network device inventories to identify and track affected routers. 7. Develop incident response plans specifically addressing potential router outages and recovery procedures. 8. Educate IT staff on this vulnerability’s characteristics to improve detection and response readiness. 9. Employ network redundancy and failover mechanisms to minimize service disruption if a router becomes unavailable. 10. Engage with vendors or third-party security providers for advanced threat detection and mitigation support.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fba47553dd06bf20485701

Added to database: 10/24/2025, 4:08:21 PM

Last enriched: 10/24/2025, 4:18:59 PM

Last updated: 10/30/2025, 2:01:00 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats