Cyber Posture

CVE-2025-60553

Critical

Published: 24 October 2025

Published
24 October 2025
Modified
28 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-60553 is a buffer overflow vulnerability (CWE-120) affecting the D-Link DIR-600L Ax router on firmware version FW116WWb01. The flaw exists in the formSetWAN_Wizard52 function via the curTime parameter, which can be triggered to overflow buffers when processing malformed input.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable remotely over the network with low complexity, no required privileges or user interaction, and unchanged impact scope. Remote attackers can thus target affected devices without authentication, potentially achieving high impacts on confidentiality, integrity, and availability through buffer overflow consequences such as arbitrary code execution or system crashes.

Details on the vulnerability, including exploitation specifics for the formSetWAN_Wizard52 buffer overflow, are documented in a GitHub repository at https://github.com/luckysmallbird/DLINK-DIR600LAx-Vulnerability/blob/main/03-buffer%20overflow-formSetWAN_Wizard52.md. No vendor advisories or patches are referenced in the CVE publication dated 2025-10-24.

Details

CWE(s)
CWE-120

Affected Products

dlink
dir-600l firmware
1.16wwb01

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Buffer overflow in the router's web management interface (formSetWAN_Wizard52) enables remote code execution via exploitation of a public-facing application.

References