CVE-2025-15192
📋 TL;DR
This CVE describes a command injection vulnerability in D-Link DWR-M920 routers that allows remote attackers to execute arbitrary commands by manipulating the fota_url parameter. The vulnerability affects D-Link DWR-M920 routers up to version 1.1.50. Attackers can exploit this remotely without authentication to potentially take control of affected devices.
💻 Affected Systems
- D-Link DWR-M920
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the router allowing persistent access, network traffic interception, lateral movement to internal networks, and use as a botnet node.
Likely Case
Router compromise leading to network disruption, credential theft, and installation of malware or backdoors.
If Mitigated
Limited impact with proper network segmentation and access controls preventing exploitation attempts.
🎯 Exploit Status
Public proof-of-concept available. Exploitation requires sending specially crafted HTTP requests to the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check D-Link support for firmware updates. 2. Download latest firmware if available. 3. Upload via web interface. 4. Reboot router.
🔧 Temporary Workarounds
Disable remote management
allPrevent external access to router administration interface
Network segmentation
allIsolate router management interface from untrusted networks
🧯 If You Can't Patch
- Replace affected devices with patched or alternative models
- Implement strict firewall rules blocking all external access to router management interfaces
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via web interface at http://[router-ip]/status.asp
Check Version:
curl -s http://[router-ip]/status.asp | grep 'Firmware Version'
Verify Fix Applied:
Verify firmware version is above 1.1.50
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /boafrm/formLtefotaUpgradeQuectel with unusual parameters
- Unusual command execution in system logs
Network Indicators:
- HTTP POST requests to router IP on port 80/443 containing shell metacharacters in parameters
SIEM Query:
source="router_logs" AND (uri="/boafrm/formLtefotaUpgradeQuectel" AND (param="fota_url" AND value CONTAINS "|" OR value CONTAINS ";" OR value CONTAINS "`"))
🔗 References
- https://github.com/panda666-888/vuls/blob/main/d-link/dwr-m920/formLtefotaUpgradeQuectel.md
- https://github.com/panda666-888/vuls/blob/main/d-link/dwr-m920/formLtefotaUpgradeQuectel.md#poc
- https://vuldb.com/?ctiid.338577
- https://vuldb.com/?id.338577
- https://vuldb.com/?submit.723555
- https://www.dlink.com/