CVE-2025-13552

8.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in D-Link DIR-822K and DWR-M920 routers allows remote attackers to execute arbitrary code by manipulating the submit-url parameter in the /boafrm/formWlEncrypt endpoint. This affects users running firmware version 1.00_20250513164613/1.1.50. The exploit is publicly available and can be triggered without authentication.

💻 Affected Systems

Products:
  • D-Link DIR-822K
  • D-Link DWR-M920
Versions: 1.00_20250513164613/1.1.50
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web management interface; devices with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network infiltration, and persistent backdoor installation.

🟠

Likely Case

Device takeover enabling network traffic interception, credential theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Directly exposed devices can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this if they reach the device.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code exists; manipulation of submit-url parameter triggers buffer overflow.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available at time of analysis

Restart Required: Yes

Instructions:

1. Monitor D-Link security advisories for firmware updates. 2. Download and install patched firmware when available. 3. Reboot device after installation.

🔧 Temporary Workarounds

Disable WAN access to web interface

all

Prevent external exploitation by blocking access to router management interface from internet.

Configure firewall to block inbound traffic to port 80/443 on WAN interface

Network segmentation

all

Isolate affected routers in separate VLAN to limit lateral movement.

vlan 100
interface vlan 100
ip address 10.0.100.1 255.255.255.0

🧯 If You Can't Patch

  • Replace affected devices with patched alternatives
  • Implement strict network access controls to limit device exposure

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface: Login > Status > Firmware Version

Check Version:

curl -s http://router-ip/status.cgi | grep firmware

Verify Fix Applied:

Verify firmware version is updated beyond 1.00_20250513164613/1.1.50

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /boafrm/formWlEncrypt
  • Multiple failed buffer overflow attempts in system logs

Network Indicators:

  • Abnormal traffic patterns to router management interface
  • Exploit-specific payloads in HTTP requests

SIEM Query:

source="router.log" AND (uri="/boafrm/formWlEncrypt" OR "submit-url" AND length>100)

🔗 References

📤 Share & Export