CVE-2025-60572

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on D-Link DIR600L routers by exploiting a buffer overflow in the formAdvNetwork function. Attackers can gain full control of affected devices by sending specially crafted requests. Only users of specific D-Link router models with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • D-Link DIR600L
Versions: FW116WWb01
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version mentioned. Other DIR600L firmware versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to persistent backdoor installation, network traffic interception, credential theft, and lateral movement to other network devices.

🟠

Likely Case

Router compromise allowing attackers to modify network settings, redirect DNS, intercept traffic, and use the device as a foothold for further attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and the vulnerability can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access, but external attacks are more likely.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists in GitHub repository. Exploitation requires sending crafted HTTP requests to the router's web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check D-Link website for firmware updates for DIR600L. 2. Download latest firmware. 3. Log into router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Wait for router to reboot.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Network Segmentation

all

Isolate router management interface from untrusted networks

🧯 If You Can't Patch

  • Replace vulnerable router with supported model
  • Implement strict firewall rules blocking all inbound traffic to router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is FW116WWb01, device is vulnerable.

Check Version:

Log into router web interface and check System Status or Firmware Update section

Verify Fix Applied:

Verify firmware version has changed from FW116WWb01 to a newer version after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to formAdvNetwork endpoint
  • Multiple failed login attempts followed by buffer overflow patterns
  • Router reboot events after suspicious requests

Network Indicators:

  • HTTP requests with unusually long curTime parameter values
  • Traffic patterns suggesting router compromise (unexpected outbound connections)

SIEM Query:

source="router_logs" AND (uri="/formAdvNetwork" OR message="buffer overflow" OR message="segmentation fault")

🔗 References

📤 Share & Export