Skip to content
CVSS 8.8 · HIGH

CVE-2026-7289

A vulnerability was found in D-Link DIR-825M 1.1.12. This issue affects the function sub_414BA8 of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

View on NVD

Analysis

This is a remote buffer overflow vulnerability affecting the firmware of a specific D-Link consumer router model. It falls under vendor-specific firmware for consumer hardware, which is excluded from the feed unless it has systemic impact on the development ecosystem.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-119CWE-120

EPSS

Probability of exploitation (next 30 days): 0.0003 (0.0%)
Percentile: 9.5%
EPSS: 2026-05-06

Affects

dlink:dir-825m_firmwaredlink:dir-825m

Technical description

A vulnerability was found in D-Link DIR-825M 1.1.12. This issue affects the function sub_414BA8 of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

Published: 4/28/2026, 3:16:37 PM
Last modified: 4/30/2026, 1:19:50 PM

References

HomeEventsBlogResourcesTeam