CVE-2025-60548
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on D-Link DIR600L routers by exploiting a buffer overflow in the formLanSetupRouterSettings function. Attackers can achieve remote code execution with high privileges by sending specially crafted requests to the vulnerable parameter. All users of affected D-Link DIR600L routers with the vulnerable firmware are at risk.
💻 Affected Systems
- D-Link DIR600L
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the router leading to persistent remote access, network traffic interception, credential theft, and pivot to internal network devices.
Likely Case
Router takeover enabling DNS hijacking, credential harvesting, and deployment of malware to connected devices.
If Mitigated
Limited impact if router is behind firewall with restricted WAN access, though internal attackers could still exploit.
🎯 Exploit Status
Public proof-of-concept available on GitHub demonstrates exploitation. No authentication required to trigger the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check D-Link support site for firmware updates. 2. Download latest firmware for DIR600L. 3. Access router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Wait for router to reboot.
🔧 Temporary Workarounds
Disable remote administration
allPrevents external attackers from accessing the vulnerable interface
Restrict LAN access
allUse firewall rules to limit which devices can access the router admin interface
🧯 If You Can't Patch
- Replace affected router with supported model
- Isolate router in separate VLAN with strict access controls
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface under System or Maintenance section
Check Version:
Check via web interface or use nmap to identify firmware version
Verify Fix Applied:
Verify firmware version has been updated to a version later than FW116WWb01
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to formLanSetupRouterSettings
- Large payloads in curTime parameter
- Router crash/reboot events
Network Indicators:
- HTTP requests with oversized curTime parameter values
- Traffic to router admin interface from unexpected sources
SIEM Query:
source="router_logs" AND (uri="*formLanSetupRouterSettings*" AND content_length>1000)