CVE-2025-60553

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on D-Link DIR600L routers via a buffer overflow in the web interface's WAN configuration function. Attackers can exploit this by sending specially crafted requests to the vulnerable parameter, potentially gaining full control of affected devices. All users of D-Link DIR600L routers with the vulnerable firmware are affected.

💻 Affected Systems

Products:
  • D-Link DIR600L
Versions: FW116WWb01
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the web management interface which is typically enabled by default on these routers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to other devices, and botnet recruitment.

🟠

Likely Case

Remote code execution allowing attackers to modify router settings, intercept traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if the router is behind a firewall with restricted WAN access and has the web interface disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains detailed technical analysis and proof-of-concept code showing exploitation is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check D-Link's official website for firmware updates. 2. Download the latest firmware for DIR600L. 3. Log into router web interface. 4. Navigate to Tools > Firmware. 5. Upload and install the new firmware. 6. Wait for router to reboot.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents external attackers from accessing the vulnerable web interface

Log into router web interface > Advanced > Remote Management > Disable

Change Default Credentials

all

Reduces risk of unauthorized access even if exploit is attempted

Log into router web interface > Tools > Admin > Change password

🧯 If You Can't Patch

  • Segment the router on an isolated network segment
  • Implement network-level firewall rules to block access to router management interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface: Log in > Status > Firmware Information

Check Version:

curl -s http://router-ip/status.cgi | grep firmware

Verify Fix Applied:

Verify firmware version has been updated to a version newer than FW116WWb01

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to formSetWAN_Wizard52 endpoint
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting command and control communication

SIEM Query:

source="router.log" AND (uri="/formSetWAN_Wizard52" OR method="POST" AND uri LIKE "%WAN%")

🔗 References

📤 Share & Export