CVE-2025-63932

7.3 HIGH

📋 TL;DR

The D-Link DIR-868L A1 router has an unauthenticated remote code execution vulnerability in its HNAP service. Attackers can exploit this by sending specially crafted HTTP SOAPAction headers to execute arbitrary shell commands without authentication. All users with affected firmware versions are vulnerable.

💻 Affected Systems

Products:
  • D-Link DIR-868L A1
Versions: FW106KRb01.bin and likely earlier versions
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: HNAP service typically enabled by default on affected routers

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to install persistent malware, intercept all network traffic, pivot to internal devices, and use the router as part of a botnet.

🟠

Likely Case

Router takeover leading to DNS hijacking, credential theft from network traffic, and installation of cryptocurrency miners or other malware.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access, though internal attackers could still exploit.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

GitHub repository contains exploit code and technical details

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.dlink.com/en/security-bulletin/

Restart Required: No

Instructions:

1. Check D-Link security bulletin for updates
2. If no patch available, consider workarounds or replacement

🔧 Temporary Workarounds

Disable HNAP Service

all

Turn off the vulnerable HNAP service if not required

Restrict WAN Access

all

Configure firewall to block external access to router admin interface

🧯 If You Can't Patch

  • Replace router with supported model
  • Place router behind dedicated firewall with strict ingress filtering

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface and compare with vulnerable version

Check Version:

Check router web interface or use nmap to identify firmware

Verify Fix Applied:

No official patch available; verify workarounds by testing HNAP service accessibility

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to HNAP endpoint
  • Multiple failed authentication attempts to router

Network Indicators:

  • HTTP requests with unusual SOAPAction headers to port 80/443
  • Unexpected outbound connections from router

SIEM Query:

source_ip=router_ip AND (http_uri CONTAINS "/HNAP1/" OR http_header CONTAINS "SOAPAction")

🔗 References

📤 Share & Export