CVE-2025-13550

8.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in D-Link DIR-822K and DWR-M920 routers allows remote attackers to execute arbitrary code by manipulating the submit-url parameter in the VPN configuration form. This affects devices running firmware version 1.00_20250513164613/1.1.50. Attackers can exploit this without authentication to potentially take full control of affected routers.

💻 Affected Systems

Products:
  • D-Link DIR-822K
  • D-Link DWR-M920
Versions: Firmware version 1.00_20250513164613/1.1.50
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the affected firmware versions are vulnerable by default. The vulnerability is in the web interface component used for VPN configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to internal networks, persistent backdoor installation, and data exfiltration.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept network traffic, or use the device as a botnet node.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering, though internal threats remain possible.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication and affects internet-facing routers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they gain network access, though external threats are more likely.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details are available in GitHub repositories. The vulnerability requires sending a specially crafted HTTP request to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available at this time

Restart Required: Yes

Instructions:

1. Check D-Link's security advisory page for updates. 2. If a patch is released, download the firmware from D-Link's official support site. 3. Log into router admin interface. 4. Navigate to firmware update section. 5. Upload and apply the new firmware. 6. Reboot the router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to the router's web interface

Log into router admin → Advanced → Remote Management → Disable

Block Access to Vulnerable Endpoint

linux

Use firewall rules to block access to /boafrm/formVpnConfigSetup

iptables -A INPUT -p tcp --dport 80 -m string --string "/boafrm/formVpnConfigSetup" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/boafrm/formVpnConfigSetup" --algo bm -j DROP

🧯 If You Can't Patch

  • Replace affected routers with different models that are not vulnerable
  • Isolate routers in a separate VLAN with strict network segmentation and monitoring

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under Maintenance → Firmware or similar section. If version matches affected range, device is vulnerable.

Check Version:

curl -s http://[router-ip]/getcfg.php | grep -i version || Check web interface manually

Verify Fix Applied:

After applying any workaround, attempt to access https://[router-ip]/boafrm/formVpnConfigSetup - it should be inaccessible or blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /boafrm/formVpnConfigSetup with long submit-url parameters
  • Unusual process creation or memory errors in router logs
  • Multiple failed login attempts followed by VPN configuration access

Network Indicators:

  • Unusual outbound connections from router to unknown IPs
  • Spike in traffic to router's web interface port (80/443)
  • HTTP requests with abnormally long URLs targeting the vulnerable endpoint

SIEM Query:

source="router_logs" AND (url="/boafrm/formVpnConfigSetup" OR url CONTAINS "submit-url") AND url_length>500

🔗 References

📤 Share & Export