Buffer Overflow Vulnerability in D-Link DWR-M920 Router
CVE-2025-15193

8.7HIGH

Key Information:

Vendor

D-link

Status
Vendor
CVE Published:
29 December 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-15193?

A vulnerability exists in the D-Link DWR-M920 router, specifically in the sub_423848 function located in the /boafrm/formParentControl file. This flaw arises from improper handling of the submit-url argument, which can lead to a buffer overflow condition. Attackers can exploit this vulnerability remotely, allowing them unauthorized access and potential manipulation of the device. The exploit is now publicly accessible, underlining the need for immediate attention and remediation.

Affected Version(s)

DWR-M920 1.1.0

DWR-M920 1.1.1

DWR-M920 1.1.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

panda_0x1 (VulDB User)
.
CVE-2025-15193 : Buffer Overflow Vulnerability in D-Link DWR-M920 Router