Stack-Based Buffer Overflow Vulnerability in D-Link DIR-853 Router
CVE-2025-25746
9.8CRITICAL
Summary
The D-Link DIR-853 A1 router with firmware version 1.20B07 is susceptible to a stack-based buffer overflow vulnerability within its SetWanSettings module. This issue arises due to improper handling of the Password parameter, potentially allowing an attacker to execute arbitrary code or disrupt service. Users are strongly encouraged to implement security measures and update their device firmware to mitigate the risks associated with this vulnerability.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved