Description
A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability affects the function sub_4151FC of the file /boafrm/formVpnConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Published: 2026-04-28
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a stack-based buffer overflow triggered by controlling the submit-url parameter in the formVpnConfigSetup function. Exercising this flaw allows an unauthenticated remote attacker to inject data that overflows the internal buffer, resulting in arbitrary code execution. The weakness is a classic example of CWE‑119 and CWE‑120 vulnerabilities.

Affected Systems

Affected product is D‑Link DIR‑825M routers running firmware 1.1.12, as sold by D‑Link. The issue resides in the /boafrm/formVpnConfigSetup code path, accessible via the router’s web administration interface.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity. The documented EPSS score is not available, so the current likelihood of exploitation cannot be precisely quantified, but the flaw is publicly disclosed and may be leveraged. The vulnerability is not listed in the CISA KEV catalog. Attackers likely must gain network access to the router’s management port and send a specially crafted request to the submit-url endpoint; the failure of input validation makes exploitation straightforward for an automated attacker with the requisite network reach.

Generated by OpenCVE AI on April 28, 2026 at 19:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the latest firmware from D-Link for the DIR‑825M (the patch fixes the buffer overflow in formVpnConfigSetup).
  • Disable remote access to the router’s management interface from external networks, or restrict it to known IP addresses.
  • Change the default administrative password and enable a strong password on the router’s web interface.

Generated by OpenCVE AI on April 28, 2026 at 19:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-825m
Vendors & Products D-link
D-link dir-825m

Tue, 28 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability affects the function sub_4151FC of the file /boafrm/formVpnConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Title D-Link DIR-825M formVpnConfigSetup sub_4151FC buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-29T14:24:38.182Z

Reserved: 2026-04-28T09:45:25.646Z

Link: CVE-2026-7288

cve-icon Vulnrichment

Updated: 2026-04-29T14:23:58.165Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T15:16:37.037

Modified: 2026-04-28T20:25:44.987

Link: CVE-2026-7288

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T10:10:41Z

Weaknesses