Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60572: n/a

0
High
VulnerabilityCVE-2025-60572cvecve-2025-60572
Published: Fri Oct 24 2025 (10/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formAdvNetwork.

AI-Powered Analysis

AILast updated: 10/24/2025, 14:59:36 UTC

Technical Analysis

The vulnerability identified as CVE-2025-60572 affects the D-Link DIR600L Ax router firmware version FW116WWb01. It is a buffer overflow vulnerability located in the formAdvNetwork function, specifically via the curTime parameter. Buffer overflow vulnerabilities occur when input data exceeds the allocated buffer size, potentially overwriting adjacent memory and allowing attackers to execute arbitrary code or crash the system. In this case, an attacker could craft malicious input targeting the curTime parameter to trigger the overflow. The vulnerability is present in the router's firmware, which handles network configuration and management functions. Since routers are critical network infrastructure devices, exploitation could lead to unauthorized access, interception of network traffic, or disruption of network services. No CVSS score has been assigned yet, and no patches or known exploits have been reported, indicating this is a newly disclosed vulnerability. The lack of authentication requirements for accessing the vulnerable function is not explicitly stated but is common in similar router vulnerabilities, increasing the risk. The router model affected is commonly used in consumer and small office environments, meaning a broad range of organizations could be impacted. The vulnerability's exploitation could allow remote attackers to compromise the device without user interaction, making it particularly dangerous. The absence of patches necessitates immediate mitigation through network controls and monitoring until an official fix is released.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for small and medium enterprises (SMEs) and home office users relying on the D-Link DIR600L Ax router. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over the router, intercept or manipulate network traffic, and pivot to internal networks. This compromises confidentiality, integrity, and availability of organizational data and services. Disruption of network connectivity could affect business operations, while unauthorized access could lead to data breaches or facilitate further attacks within the network. Given the widespread use of D-Link routers in Europe, particularly in residential and small business markets, the vulnerability poses a broad risk. The lack of known exploits currently provides a window for proactive defense, but the potential for rapid weaponization exists. Organizations with less mature network security practices or those exposing router management interfaces to the internet are at higher risk. The impact is exacerbated by the absence of patches, requiring organizations to rely on compensating controls.

Mitigation Recommendations

1. Immediately restrict access to the router's management interface by disabling remote administration and limiting access to trusted IP addresses or internal networks only. 2. Implement network segmentation to isolate vulnerable routers from critical systems and sensitive data. 3. Monitor network traffic for unusual patterns or attempts to exploit the curTime parameter, using intrusion detection/prevention systems with custom signatures if possible. 4. Regularly audit and update router configurations to disable unnecessary services and enforce strong authentication where available. 5. Encourage users to change default credentials and use strong, unique passwords for router access. 6. Maintain an inventory of affected devices within the organization to prioritize mitigation efforts. 7. Stay informed about vendor advisories and apply firmware updates promptly once patches become available. 8. Consider deploying network-level protections such as firewalls or gateway devices that can detect and block exploit attempts targeting this vulnerability. 9. Educate users about the risks of exposing network devices to the internet and promote best practices for home and small office network security.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fb9152b0116405c2a4da19

Added to database: 10/24/2025, 2:46:42 PM

Last enriched: 10/24/2025, 2:59:36 PM

Last updated: 10/30/2025, 1:49:32 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats