CVE-2025-13548

8.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in D-Link DIR-822K and DWR-M920 routers allows remote attackers to execute arbitrary code by manipulating the submit-url parameter in the /boafrm/formFirewallAdv endpoint. This affects users running vulnerable firmware versions, potentially leading to complete device compromise. The vulnerability is remotely exploitable without authentication.

💻 Affected Systems

Products:
  • D-Link DIR-822K
  • D-Link DWR-M920
Versions: 1.00_20250513164613/1.1.50
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version mentioned; other versions may also be vulnerable but unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full device takeover, creation of persistent backdoors, lateral movement into internal networks, and data exfiltration.

🟠

Likely Case

Device compromise allowing attackers to modify router settings, intercept network traffic, and use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering, though internal network exposure remains a concern.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication and affects internet-facing routers.
🏢 Internal Only: MEDIUM - Internal devices could be targeted through phishing or compromised internal hosts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making weaponization likely. The buffer overflow appears straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known at this time

Restart Required: Yes

Instructions:

1. Check D-Link's security advisory page for updates. 2. If a patch is released, download the firmware from D-Link's support site. 3. Upload the firmware through the router's web interface. 4. Reboot the router after installation.

🔧 Temporary Workarounds

Disable WAN access to admin interface

all

Prevent remote exploitation by disabling external access to the router's management interface.

Access router web interface -> Security -> Remote Management -> Disable

Implement network segmentation

all

Isolate affected routers from critical internal networks to limit lateral movement.

🧯 If You Can't Patch

  • Immediately disconnect affected devices from the internet and place them behind a firewall with strict inbound rules.
  • Replace affected devices with patched or alternative models if no fix becomes available.

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface: System -> Firmware Information. If version matches affected range, device is vulnerable.

Check Version:

curl -s http://router-ip/boafrm/formSysCmd | grep version (if accessible)

Verify Fix Applied:

After patching, verify firmware version has changed from the vulnerable version. Test the /boafrm/formFirewallAdv endpoint with controlled payloads if possible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /boafrm/formFirewallAdv with long submit-url parameters
  • Router reboot events or configuration changes from unknown sources

Network Indicators:

  • Unexpected outbound connections from router to suspicious IPs
  • Traffic patterns indicating router compromise (e.g., scanning behavior)

SIEM Query:

source="router_logs" AND uri="/boafrm/formFirewallAdv" AND (submit-url.length > 100 OR status=500)

🔗 References

📤 Share & Export