CVE-2025-60570
D-Link · D-Link Multiple Products
A high-severity buffer overflow vulnerability has been identified in multiple D-Link products, including the DIR-600L router.
Executive summary
A high-severity buffer overflow vulnerability has been identified in multiple D-Link products, including the DIR-600L router. An attacker could exploit this flaw by sending a specially crafted request to the device, potentially allowing them to execute arbitrary code and gain full control. This could lead to network compromise, data interception, or the device being used in further malicious activities.
Vulnerability
This vulnerability is a classic buffer overflow that exists in the formLogDnsquery function. An attacker can exploit this by sending a request containing an overly long string in the curTime parameter. The function does not properly validate the length of this input, causing it to write data beyond the boundaries of the allocated memory buffer, which can overwrite adjacent memory structures. A successful exploit could lead to arbitrary code execution with the privileges of the device's firmware, or it could cause a denial-of-service condition by crashing the device.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could allow an unauthenticated attacker to execute arbitrary code on the affected D-Link device, leading to a complete system compromise. The potential business impact includes the interception of sensitive network traffic, unauthorized access to the internal network, and the use of the compromised device as a pivot point for further attacks or as part of a botnet. This poses a significant risk to data confidentiality, network integrity, and business continuity.
Remediation
Immediate Action: Apply the security updates released by D-Link to all affected devices without delay. After patching, it is critical to monitor for any signs of exploitation attempts and thoroughly review system and access logs for suspicious activity that may have occurred prior to the patch application.
Proactive Monitoring: Security teams should monitor for unusual traffic patterns or malformed requests directed at the device's web management interface, specifically targeting the formLogDnsquery function or containing an abnormally long curTime parameter. Implement IDS/IPS signatures designed to detect buffer overflow attempts. Review device logs for unexpected reboots, crashes, or error messages which could indicate failed exploitation attempts.
Compensating Controls: If immediate patching is not feasible, restrict access to the device's management interface to a trusted internal network or specific administrative IP addresses. Disable remote (WAN) administration unless it is absolutely essential. Consider placing the device behind a Web Application Firewall (WAF) or an Intrusion Prevention System (IPS) that can inspect and block malicious requests targeting this vulnerability.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Given the high severity (CVSS 7.5) of this vulnerability and the potential for a complete device compromise, organizations must prioritize the immediate patching of all affected D-Link devices. While this CVE is not currently listed on the CISA KEV catalog, its nature as a buffer overflow makes it an attractive and reliable target for attackers. Organizations should treat this as a critical priority and implement the recommended remediation and monitoring actions to prevent a potential network breach.