CVE-2025-60557

7.5 HIGH

📋 TL;DR

This buffer overflow vulnerability in D-Link DIR600L routers allows attackers to execute arbitrary code by sending specially crafted requests to the formSetEasy_Wizard function. It affects users running firmware version FW116WWb01 on DIR600L Ax routers. Successful exploitation could lead to complete device compromise.

💻 Affected Systems

Products:
  • D-Link DIR600L Ax
Versions: FW116WWb01
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version mentioned. Older or newer versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full router compromise, credential theft, network traffic interception, and pivot to internal networks.

🟠

Likely Case

Router crash/reboot causing denial of service, or limited code execution depending on exploit sophistication.

🟢

If Mitigated

No impact if device is not internet-facing and network segmentation prevents access to management interface.

🌐 Internet-Facing: HIGH - Router management interfaces are often exposed to the internet, and this vulnerability requires no authentication.
🏢 Internal Only: MEDIUM - Attackers with internal network access could exploit this to compromise the router.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists in GitHub repository. Exploitation appears straightforward based on available technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check D-Link support site for firmware updates. 2. Download latest firmware for DIR600L Ax. 3. Log into router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Wait for router to reboot.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router management interface

Network Segmentation

all

Isolate router management interface to trusted network segment only

🧯 If You Can't Patch

  • Replace vulnerable router with supported model
  • Implement strict firewall rules blocking all access to router management interface from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is FW116WWb01, device is vulnerable.

Check Version:

Log into router web interface and check System Status or Firmware Update section

Verify Fix Applied:

Verify firmware version has been updated to a version newer than FW116WWb01.

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to formSetEasy_Wizard with long curTime parameters
  • Router crash/reboot logs
  • Unusual outbound connections from router

Network Indicators:

  • HTTP POST requests to router management interface with oversized curTime parameter
  • Sudden loss of router connectivity

SIEM Query:

source="router_logs" AND ("formSetEasy_Wizard" OR "curTime" AND length>100)

🔗 References

📤 Share & Export