Cyber Posture

CVE-2025-25746

CriticalPublic PoC

Published: 12 February 2025

Published
12 February 2025
Modified
18 March 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0109 78.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-25746 is a stack-based buffer overflow vulnerability (CWE-787) affecting the D-Link DIR-853 router with firmware version A1 FW1.20B07. The flaw resides in the SetWanSettings module, where insufficient bounds checking on the Password parameter allows an attacker to overflow the stack by supplying overly long input. Published on 2025-02-12, it carries a CVSS v3.1 base score of 9.8, reflecting its critical severity due to network accessibility, low attack complexity, and lack of prerequisites.

The vulnerability enables remote exploitation over the network without authentication, privileges, or user interaction (AV:N/AC:L/PR:N/UI:N). Successful exploitation grants high-impact outcomes across confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U), potentially allowing arbitrary code execution, full device compromise, or denial of service on the affected router.

For mitigation details, refer to the advisory at https://dear-sunshine-ba5.notion.site/D-Link-DIR-853-5-1812386a66448044b489f223b8c2e78a, which provides vulnerability analysis and likely patch or workaround guidance specific to the D-Link DIR-853.

Details

CWE(s)
CWE-787

Affected Products

dlink
dir-853 firmware
1.20b07

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The remote unauthenticated stack-based buffer overflow in the SetWanSettings module of the public-facing D-Link DIR-853 router management interface directly enables T1190: Exploit Public-Facing Application, leading to arbitrary code execution or DoS.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References