D-Link DIR-825M Buffer Overflow (CVE-2026-7289) Exposes Routers

D-Link DIR-825M Buffer Overflow (CVE-2026-7289) Exposes Routers

The National Vulnerability Database (NVD) has detailed a critical buffer overflow vulnerability, CVE-2026-7289, affecting the D-Link DIR-825M router firmware version 1.1.12. This flaw resides within the sub_414BA8 function in the /boafrm/formWanConfigSetup file. Attackers can trigger this vulnerability remotely by manipulating the submit-url argument, leading to a buffer overflow.

Rated with a high CVSS score of 8.8, this vulnerability presents a significant risk. Its exploitability is high, with public proof-of-concept code readily available, meaning an attacker doesn’t need sophisticated tools or techniques. The impact is severe, potentially allowing for full compromise of the affected device, including confidentiality, integrity, and availability.

For defenders, this means D-Link DIR-825M routers running the specified firmware are directly exposed to remote attackers. The public exploit code drastically lowers the bar for adversaries, making these devices prime targets for initial access. Organizations and individuals using these routers must prioritize patching or replacing them immediately to prevent unauthorized access and network compromise.

What This Means For You

  • If your organization or home network relies on a D-Link DIR-825M router running firmware 1.1.12, you are directly exposed to a critical, publicly exploited buffer overflow (CVE-2026-7289). Check your router's firmware version immediately. If affected, patch to a secure version or replace the device without delay. This isn't a theoretical threat; public exploits mean attackers are already leveraging it.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

D-Link DIR-825M submit-url Buffer Overflow Attempt (CVE-2026-7289)

Sigma YAML — free preview
title: D-Link DIR-825M submit-url Buffer Overflow Attempt (CVE-2026-7289)
id: scw-2026-04-28-ai-1
status: experimental
level: critical
description: |
  This rule detects attempts to exploit the buffer overflow vulnerability (CVE-2026-7289) in D-Link DIR-825M routers. The exploit targets the `submit-url` parameter within the `/boafrm/formWanConfigSetup` endpoint. Successful exploitation allows remote attackers to execute arbitrary code.
author: SCW Feed Engine (AI-generated)
date: 2026-04-28
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-7289/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/boafrm/formWanConfigSetup'
      cs-uri-query|contains:
          - 'submit-url='
      cs-method:
          - 'POST'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-7289 Buffer Overflow D-Link DIR-825M version 1.1.12
CVE-2026-7289 Buffer Overflow Vulnerable function: sub_414BA8 in /boafrm/formWanConfigSetup
CVE-2026-7289 Buffer Overflow Vulnerable argument: submit-url
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 28, 2026 at 18:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2025-60887 — Cista Insecure Deserialization

CVE-2025-60887 — An issue was discovered in Cista v0.15 and below. Insecure deserialization of untrusted input under certain conditions may lead to leaking of stack/heap...

vulnerabilityCVEmedium-severityinsecure-deserialization
/SCW Vulnerability Desk /MEDIUM /5.3 /⚑ 1 IOC /⚙ 3 Sigma

Firefox ESR Sandbox Escape: Critical CVE-2026-7321 Demands Immediate Attention

CVE-2026-7321 — Sandbox escape due to incorrect boundary conditions in the WebRTC: Networking component. This vulnerability was fixed in Firefox ESR 140.10.1.

vulnerabilityCVEcriticalhigh-severitycwe-120
/SCW Vulnerability Desk /CRITICAL /9.6 /⚑ 2 IOCs /⚙ 4 Sigma

D-Link DIR-825M Buffer Overflow (CVE-2026-7288) Publicly Disclosed

CVE-2026-7288 — A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability affects the function sub_4151FC of the file /boafrm/formVpnConfigSetup. The manipulation of the...

vulnerabilityCVEhigh-severitybuffer-overflowcwe-119cwe-120
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 1 IOC