CVE-2025-60548
Published: 24 October 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-60548 is a buffer overflow vulnerability (CWE-120) in the D-Link DIR-600L Ax router running firmware version FW116WWb01. The flaw occurs in the formLanSetupRouterSettings function when processing the curTime parameter, potentially allowing memory corruption due to insufficient bounds checking on user-supplied input.
The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. Remote attackers require only network access, with low attack complexity, no privileges, and no user interaction. Exploitation can achieve high impacts on confidentiality, integrity, and availability, enabling arbitrary code execution or denial of service on the affected device.
Mitigation details are available in the vulnerability advisory published on GitHub at https://github.com/luckysmallbird/DLINK-DIR600LAx-Vulnerability/blob/main/01-buffer%20overflow-formLanSetupRouterSettings.md. Security practitioners should review this resource for technical analysis, proof-of-concept information, and recommended remediation steps, such as firmware updates if available from D-Link.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Buffer overflow via curTime parameter in formLanSetupRouterSettings enables remote code execution by exploiting the router's public-facing web application.