<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dlink — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/dlink/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 15:16:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/dlink/feed.xml" rel="self" type="application/rss+xml"/><item><title>D-Link DIR-825M Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-buffer-overflow/</link><pubDate>Tue, 28 Apr 2026 15:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-buffer-overflow/</guid><description>D-Link DIR-825M version 1.1.12 is vulnerable to a buffer overflow via manipulation of the submit-url argument in the /boafrm/formWanConfigSetup file's sub_414BA8 function, allowing a remote attacker to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability exists in D-Link DIR-825M router version 1.1.12. The vulnerability is located within the <code>sub_414BA8</code> function of the <code>/boafrm/formWanConfigSetup</code> file. An attacker can exploit this flaw by manipulating the <code>submit-url</code> argument, leading to arbitrary code execution on the device. This vulnerability is remotely exploitable, and a proof-of-concept exploit is publicly available, increasing the risk of widespread attacks. Exploitation does not require authentication by default, and could allow an attacker to gain complete control over the device. This poses a significant threat to home and small business networks relying on this router model.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-825M router running firmware version 1.1.12.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/boafrm/formWanConfigSetup</code> endpoint.</li>
<li>The attacker includes the <code>submit-url</code> argument in the POST request, injecting a buffer overflow payload.</li>
<li>The crafted payload overflows the buffer in the <code>sub_414BA8</code> function during the processing of the <code>submit-url</code> argument.</li>
<li>The buffer overflow overwrites critical memory regions, including the return address.</li>
<li>When the <code>sub_414BA8</code> function returns, control is redirected to the attacker-controlled address.</li>
<li>The attacker&rsquo;s payload executes arbitrary code, potentially downloading and executing a secondary payload.</li>
<li>The attacker gains remote shell access to the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the D-Link DIR-825M router. This can lead to complete compromise of the device, allowing the attacker to eavesdrop on network traffic, modify router settings, or use the router as a botnet node for further malicious activities. Given the widespread use of D-Link routers in home and small business networks, a successful attack could compromise a large number of devices and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates from D-Link to patch CVE-2026-7289.</li>
<li>Deploy the following Sigma rule to detect suspicious POST requests to <code>/boafrm/formWanConfigSetup</code> with overly long <code>submit-url</code> parameters.</li>
<li>Monitor web server logs for suspicious activity related to the <code>/boafrm/formWanConfigSetup</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>dlink</category><category>cve</category></item><item><title>D-Link DIR-605L Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-bo/</link><pubDate>Thu, 09 Apr 2026 21:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-dir605l-bo/</guid><description>A remote buffer overflow vulnerability exists in the D-Link DIR-605L version 2.13B01 due to improper handling of the 'curTime' argument in the '/goform/formVirtualServ' POST request handler, potentially allowing attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, CVE-2026-5979, has been identified in D-Link DIR-605L router with firmware version 2.13B01. The vulnerability resides in the <code>formVirtualServ</code> function within the <code>/goform/formVirtualServ</code> component, specifically within the POST request handler. By manipulating the <code>curTime</code> argument, a remote attacker can trigger a buffer overflow. According to the NVD, an exploit is publicly available, increasing the risk of exploitation. This vulnerability affects end-of-life products, making patching impossible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable D-Link DIR-605L router running firmware 2.13B01.</li>
<li>Attacker crafts a malicious HTTP POST request targeting the <code>/goform/formVirtualServ</code> endpoint.</li>
<li>The POST request includes the <code>curTime</code> argument with a value exceeding the buffer&rsquo;s capacity.</li>
<li>The router&rsquo;s <code>formVirtualServ</code> function processes the POST request without proper bounds checking.</li>
<li>The oversized <code>curTime</code> value overwrites adjacent memory regions on the stack or heap.</li>
<li>The attacker carefully crafts the overflow payload to overwrite the return address.</li>
<li>Upon returning from the <code>formVirtualServ</code> function, control is transferred to the attacker-controlled address.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability (CVE-2026-5979) can lead to complete compromise of the D-Link DIR-605L router. Attackers could potentially execute arbitrary code, enabling them to modify router settings, intercept network traffic, or use the compromised device as a pivot point for further attacks within the network. Due to the product being end-of-life, a patch is not available. The number of vulnerable devices is unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor webserver logs for requests to <code>/goform/formVirtualServ</code> with unusually long <code>curTime</code> parameters to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Suspiciously Long curTime Parameter in D-Link Routers&rdquo;).</li>
<li>Implement network intrusion detection system (IDS) rules to detect suspicious traffic patterns associated with buffer overflow exploits targeting web interfaces.</li>
<li>Since this device is end-of-life, consider replacing the D-Link DIR-605L router with a supported model to mitigate the risk, as there will be no patches issued.</li>
<li>Examine network traffic for unusual outbound connections originating from D-Link DIR-605L routers to identify potentially compromised devices (see Sigma rule &ldquo;Detect Outbound Connections from D-Link Routers&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>dlink</category><category>router</category><category>buffer_overflow</category><category>cve-2026-5979</category></item></channel></rss>