CVE-2025-60570
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on D-Link DIR600L routers via a buffer overflow in the DNS query logging function. Attackers can exploit this by sending specially crafted requests to the vulnerable parameter. All users of affected firmware versions are at risk.
💻 Affected Systems
- D-Link DIR600L
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise leading to persistent backdoor installation, network traffic interception, and lateral movement to other devices on the network.
Likely Case
Router crash causing denial of service, or limited code execution allowing configuration changes and credential theft.
If Mitigated
Denial of service only if exploit attempts are blocked by network controls, with no code execution.
🎯 Exploit Status
Public proof-of-concept available on GitHub demonstrates exploitation. No authentication required to trigger the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: Yes
Instructions:
1. Check D-Link support site for firmware updates
2. If update available, download and install via web interface
3. Reboot router after installation
4. Verify firmware version changed
🔧 Temporary Workarounds
Disable Remote Management
allPrevents external exploitation by disabling web interface access from WAN
Network Segmentation
allIsolate router management interface to separate VLAN
🧯 If You Can't Patch
- Replace affected device with supported model
- Implement strict firewall rules blocking all external access to router management interface
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router web interface under Maintenance > Firmware
Check Version:
curl -s http://router-ip/status.html | grep Firmware
Verify Fix Applied:
Verify firmware version is no longer FW116WWb01
📡 Detection & Monitoring
Log Indicators:
- Multiple malformed DNS query log entries
- Router crash/reboot events
- Unusual POST requests to formLogDnsquery
Network Indicators:
- HTTP requests with oversized curTime parameter
- Exploit pattern matching known PoC signatures
SIEM Query:
http.method=POST AND http.uri="/formLogDnsquery" AND http.param.curTime.length>100