Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Multiple Critical Vulnerabilities in D-Link Routers Let Attackers Execute Arbitrary Code Remotely

Multiple Critical Vulnerabilities in D-Link Routers Let Attackers Execute Arbitrary Code Remotely

Posted on June 30, 2025June 30, 2025 By CWS

A number of essential vulnerabilities in D-Hyperlink router fashions may enable distant attackers to execute arbitrary code and achieve unauthorized entry to the community infrastructure. 

Abstract
1. Six essential vulnerabilities in D-Hyperlink DIR-816 routers enable distant code execution (CVSS 9.8)
2. Buffer overflow and command injection assaults allow full router takeover through the net interface.
3. No safety patches out there – all DIR-816 fashions are Finish-of-Life with everlasting vulnerabilities.

The vulnerabilities have an effect on all {hardware} revisions and firmware variations of the non-US DIR-816 fashions, which have now reached their Finish-of-Life (EOL) standing.

Buffer Overflow Flaws Allow Distant Code Execution

4 of the six vulnerabilities are categorised as essential stack-based buffer overflow assaults with CVSS scores of 9.8, representing the best severity stage. 

These flaws embody CVE-2025-5622 affecting the wirelessApcli_5g perform in /goform/wirelessApcli_5g, the place manipulation of parameters apcli_mode_5g, apcli_enc_5g, and apcli_default_key_5g results in reminiscence corruption.

CVE-2025-5623 and CVE-2025-5624 each goal the qosClassifier perform in /goform/qosClassifier, exploiting the dip_address and sip_address arguments to set off stack-based buffer overflows. 

A essential vulnerability, CVE-2025-5630, impacts the /goform/form2lansetup.cgi file by means of manipulation of the IP parameter.

These vulnerabilities fall underneath CWE-121 (Stack-based Buffer Overflow) and CWE-119 (Reminiscence Corruption) classes, enabling attackers to overwrite reminiscence segments and doubtlessly execute malicious code with administrative privileges.

Command Injection Vulnerabilities 

Two further high-severity vulnerabilities contain OS command injection assaults. CVE-2025-5620 targets the setipsec_config perform in /goform/setipsec_config, the place attackers can manipulate localIP and remoteIP parameters to inject arbitrary system instructions. 

Equally, CVE-2025-5621 exploits the identical qosClassifier perform by means of dip_address and sip_address parameters.

These command injection flaws, categorized underneath CWE-78 (OS Command Injection) and CWE-77 (Command Injection), carry CVSS scores of seven.3 and allow attackers to execute unauthorized working system instructions remotely.

CVEsDescriptionCVSS 3.1 ScoreCVE-2025-5622Stack-based buffer overflow9.8 (Vital)CVE-2025-5623Stack-based buffer overflow9.8 (Vital)CVE-2025-5624Stack-based buffer overflow9.8 (Vital)CVE-2025-5630Stack-based buffer overflow 9.8 (Vital)CVE-2025-5620OS command injection7.3 (Excessive)CVE-2025-5621OS command injection 7.3 (Excessive)

Quick Retirement Really useful 

The vulnerabilities had been initially disclosed by safety researcher pjqwudi by means of VULdb Disclosure, highlighting the essential nature of those community infrastructure safety flaws.

D-Hyperlink has formally designated all DIR-816 fashions as Finish-of-Service (EOS), which means no firmware updates or safety patches will likely be launched. 

The corporate strongly recommends instant retirement of those units, warning that continued use poses vital safety dangers to linked networks.

Customers are suggested to transition to current-generation merchandise with lively firmware improvement, carry out complete information backups, and phone D-Hyperlink regional places of work for alternative suggestions.

Examine dwell malware habits, hint each step of an assault, and make quicker, smarter safety selections -> Attempt ANY.RUN now 

Cyber Security News Tags:Arbitrary, Attackers, Code, Critical, DLink, Execute, Multiple, Remotely, Routers, Vulnerabilities

Post navigation

Previous Post: New Open-Source Tool From Microsoft to Analyze Malware Hidden Within Rust Binaries
Next Post: U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure

Related Posts

Threat Actors Hacked Global Companies via Leaked Cloud Credentials from Infostealer Infections Threat Actors Hacked Global Companies via Leaked Cloud Credentials from Infostealer Infections Cyber Security News
Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack Cyber Security News
Fancy Bear Targets Microsoft Vulnerability in Cyberattack Fancy Bear Targets Microsoft Vulnerability in Cyberattack Cyber Security News
New VMScape Spectre-BTI Attack Exploits Isolation Gaps in AMD and Intel CPUs New VMScape Spectre-BTI Attack Exploits Isolation Gaps in AMD and Intel CPUs Cyber Security News
Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Cyber Security News
Threat Actors Leverage Zoho WorkDrive Folder to Deliver Obfuscated PureRAT Malware Threat Actors Leverage Zoho WorkDrive Folder to Deliver Obfuscated PureRAT Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark