CVE-2025-13549

D-Link · D-Link Multiple Products

A high-severity vulnerability has been discovered in multiple D-Link products, including the DIR-822K router.

Executive summary

A high-severity vulnerability has been discovered in multiple D-Link products, including the DIR-822K router. This flaw allows a remote attacker to potentially take full control of affected devices without authentication. Successful exploitation could lead to network traffic interception, unauthorized access to the internal network, and deployment of malware.

Vulnerability

The vulnerability, rated with a CVSS score of 8.8, likely stems from a flaw such as command injection or a buffer overflow within the device's web management interface. An unauthenticated attacker on the same network (or remotely, if the management interface is exposed to the internet) can send a specially crafted request to the device. This allows the attacker to execute arbitrary code with the highest privileges, effectively gaining complete control over the networking device.

Business impact

This vulnerability is classified as High severity with a CVSS score of 8.8. Exploitation could have a significant business impact by compromising the network perimeter. An attacker could intercept sensitive data passing through the router, pivot to attack other systems on the internal network, disrupt internet connectivity, or use the compromised device in a larger botnet for malicious activities. This poses a direct risk to data confidentiality, operational continuity, and the overall security posture of the organization.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by D-Link immediately across all affected devices. After patching, review device administration and access logs for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Monitor network traffic for unusual outbound connections originating from the D-Link devices. System administrators should also monitor for unauthorized configuration changes, unexpected device reboots, and suspicious login attempts in the management interface logs.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:

  • Disable remote (WAN) administration of the device.
  • Restrict access to the device's management interface to a dedicated and trusted management network or specific IP addresses.
  • Ensure the device is behind a firewall that can filter potentially malicious traffic.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high CVSS score of 8.8, this vulnerability presents a critical risk and requires immediate attention. Organizations must prioritize the deployment of the vendor-supplied patches, focusing first on devices with management interfaces exposed to the internet. Although CVE-2025-13549 is not currently on the CISA KEV list, its severity makes it a likely candidate for future inclusion. We strongly recommend applying patches or compensating controls within the next 72 hours to prevent potential compromise.