CVE-2025-60561

7.5 HIGH

📋 TL;DR

This buffer overflow vulnerability in D-Link DIR600L routers allows attackers to execute arbitrary code by sending specially crafted requests to the formSetEmail function. Attackers could potentially take full control of affected routers. All users running vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • D-Link DIR600L
Versions: FW116WWb01 and likely earlier versions
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface. Email functionality must be accessible/configured for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, credential theft, network traffic interception, and lateral movement into connected devices.

🟠

Likely Case

Router compromise allowing attackers to modify DNS settings, intercept traffic, or use the router as part of a botnet.

🟢

If Mitigated

Limited impact if router is behind firewall with strict inbound filtering and email functionality is disabled.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with web management interfaces accessible from WAN.
🏢 Internal Only: MEDIUM - Attackers on the local network could exploit this without internet access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires sending crafted HTTP requests to the vulnerable endpoint. Authentication status unclear from available information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check D-Link support site for firmware updates. 2. Download latest firmware for DIR600L. 3. Log into router web interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router web interface

Restrict management interface access

linux

Configure firewall rules to limit access to router management IP

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict network segmentation
  • Implement network monitoring for unusual HTTP requests to router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under System > Firmware or via command: cat /proc/version

Check Version:

cat /proc/version or check web interface System > Firmware

Verify Fix Applied:

Verify firmware version is newer than FW116WWb01 and test with known exploit payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /goform/formSetEmail
  • Large curTime parameter values in HTTP requests
  • Router crash/reboot logs

Network Indicators:

  • HTTP requests with abnormally long curTime parameters
  • Traffic to router management interface from unexpected sources

SIEM Query:

source="router_logs" AND (url="/goform/formSetEmail" OR "curTime=" AND length(curTime)>100)

🔗 References

📤 Share & Export