CVE-2025-13550
📋 TL;DR
A buffer overflow vulnerability in D-Link DIR-822K and DWR-M920 routers allows remote attackers to execute arbitrary code by manipulating the submit-url parameter in the VPN configuration form. This affects devices running firmware version 1.00_20250513164613/1.1.50. Attackers can exploit this without authentication to potentially take full control of affected routers.
💻 Affected Systems
- D-Link DIR-822K
- D-Link DWR-M920
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, lateral movement to internal networks, persistent backdoor installation, and data exfiltration.
Likely Case
Remote code execution allowing attackers to modify router settings, intercept network traffic, or use the device as a botnet node.
If Mitigated
Limited impact if devices are behind firewalls with strict inbound filtering, though internal threats remain possible.
🎯 Exploit Status
Public exploit details are available in GitHub repositories. The vulnerability requires sending a specially crafted HTTP request to the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available at this time
Restart Required: Yes
Instructions:
1. Check D-Link's security advisory page for updates. 2. If a patch is released, download the firmware from D-Link's official support site. 3. Log into router admin interface. 4. Navigate to firmware update section. 5. Upload and apply the new firmware. 6. Reboot the router.
🔧 Temporary Workarounds
Disable Remote Management
allPrevent external access to the router's web interface
Log into router admin → Advanced → Remote Management → Disable
Block Access to Vulnerable Endpoint
linuxUse firewall rules to block access to /boafrm/formVpnConfigSetup
iptables -A INPUT -p tcp --dport 80 -m string --string "/boafrm/formVpnConfigSetup" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/boafrm/formVpnConfigSetup" --algo bm -j DROP
🧯 If You Can't Patch
- Replace affected routers with different models that are not vulnerable
- Isolate routers in a separate VLAN with strict network segmentation and monitoring
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface under Maintenance → Firmware or similar section. If version matches affected range, device is vulnerable.
Check Version:
curl -s http://[router-ip]/getcfg.php | grep -i version || Check web interface manually
Verify Fix Applied:
After applying any workaround, attempt to access https://[router-ip]/boafrm/formVpnConfigSetup - it should be inaccessible or blocked.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /boafrm/formVpnConfigSetup with long submit-url parameters
- Unusual process creation or memory errors in router logs
- Multiple failed login attempts followed by VPN configuration access
Network Indicators:
- Unusual outbound connections from router to unknown IPs
- Spike in traffic to router's web interface port (80/443)
- HTTP requests with abnormally long URLs targeting the vulnerable endpoint
SIEM Query:
source="router_logs" AND (url="/boafrm/formVpnConfigSetup" OR url CONTAINS "submit-url") AND url_length>500
🔗 References
- https://github.com/QIU-DIE/CVE/issues/33
- https://github.com/QIU-DIE/CVE/issues/47
- https://vuldb.com/?ctiid.333317
- https://vuldb.com/?id.333317
- https://vuldb.com/?submit.693777
- https://vuldb.com/?submit.695437
- https://www.dlink.com/
- https://github.com/QIU-DIE/CVE/issues/33
- https://github.com/QIU-DIE/CVE/issues/47