CVE-2025-15190
D-Link · D-Link Multiple Products
A high-severity vulnerability has been identified in multiple D-Link products, including the DWR-M920 router.
Executive summary
A high-severity vulnerability has been identified in multiple D-Link products, including the DWR-M920 router. This flaw could allow a remote, unauthenticated attacker to take complete control of an affected device, potentially leading to network traffic interception, service disruption, or unauthorized access to the internal network. Organizations are urged to apply vendor-supplied patches immediately to mitigate this significant security risk.
Vulnerability
The vulnerability is a command injection flaw within the web management interface of the affected devices. An unauthenticated attacker can send a specially crafted HTTP request to a specific endpoint on the device's web server. The device fails to properly sanitize user-supplied input within this request, allowing the attacker to inject and execute arbitrary operating system commands with root-level privileges, resulting in a full compromise of the device.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation poses a significant risk to the organization. An attacker gaining root-level control of a network gateway device can intercept, modify, or redirect all network traffic, leading to data theft of sensitive information. The compromised device could also be used as a pivot point to launch further attacks against the internal network, or be enrolled in a botnet for use in larger-scale attacks like Distributed Denial of Service (DDoS). The potential consequences include data breaches, network outages, and reputational damage.
Remediation
Immediate Action: Apply vendor-provided security updates immediately to all affected D-Link devices. After patching, it is crucial to monitor for any signs of post-compromise activity by reviewing system and access logs for unusual or unauthorized connections that may have occurred prior to remediation.
Proactive Monitoring: Implement enhanced monitoring on network segments with affected devices. Security teams should look for:
- Unusual outbound connections originating from the D-Link devices.
- Anomalous traffic patterns or spikes in bandwidth usage.
- Unauthorized configuration changes or unexpected device reboots in system logs.
- Inbound connection attempts to the device's management interface from untrusted IP addresses.
Compensating Controls: If patching cannot be immediately deployed, implement the following controls to reduce the risk of exploitation:
- Disable remote/WAN management access to the device's administrative interface.
- If remote access is required, restrict it to a trusted set of source IP addresses or place it behind a VPN.
- Implement network segmentation to limit the potential impact of a device compromise on other critical network assets.
Exploitation status
Public Exploit Available: False (as of December 30, 2025)
Analyst recommendation
Given the High severity (CVSS 8.8) of this vulnerability, immediate action is required to prevent potential compromise. The primary recommendation is to apply the security updates provided by D-Link to all affected devices without delay. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its characteristics make it a likely candidate for future inclusion. If immediate patching is not feasible, organizations must implement the recommended compensating controls, particularly restricting all external access to the device's management interface, to mitigate the immediate risk of exploitation.