• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10341
DIR-825 :: H/W Revisions A thru I :: All F/W Version :: End-of-Life / End-of-Service :: Accused of Security Vulnerability
Publication ID: SAP10341
Resolved Status: Yes
Published on: 12 June 2023 11:22 GMT
Last updated on: 14 July 2025 9:09 GMT

 

Overview  

The D-Link DIR-825 Wi-Fi Router, all hardware revisions, are legacy devices as listed below in the table. All hardware revisions have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle.  D-Link US recommends that D-Link devices that have reached EOL/EOS be retired and replaced. If outside the US, please get in touch with your regional office for recommendations (LINK). 

As a general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products ceases.  Please read the information and recommendations below.
  

3rd Party Report information

Report 1 & 2: reported 06/09/2023
Author: Arizona State University, Laboratory of Security Engineering for Future Computing  (SEFCOM)

·      Hui Jun Tay :: hui _dot_ jun_dot_ tay _at_ gmail _dot_ com

·      Kyle Zeng :: zengyhkyle _at_ asu _dot_ edu

·      Jayakrishna Vadayath :: jvadayat _at_ asu _dot_ edu

·      Fish Wang :: fishw _at_ asu _dot_ edu

·      Yan Shoshitaishvili :: yans _at_ asu _dot_ edu

·      Adam Doupé :: doupe _at_ asu _dot_ edu

DIR-825 (v2.09EU Build: 09beta03) reference: /sbin/httpd

·      Report #1: Stack overflow via strcat() at 0x4070e0 in do_file()

·      Report #2: memcpy() at 0x408b50 copies user input into fixed-size heap buffer and overflows it

 

Report 3: reported 06/12/2023
Author:
Sejong University, Intelligence Security Lab. (ISEC)

·       Juhwan Kim, Ph.D. :: juhwan _at_ sju _dot_ ac _dot_ kr

 Disclosure:  Link to Public Disclosure

 DIR-825 (H/W Rev. Bx F/W v2.10) stack-based buffer overflow

Description: vulnerability found in the DIR-825 firmware, version Rev.B 2.10. This critical vulnerability is located within the /sbin/httpd file. It can be exploited to execute arbitrary code through the manipulation of the URI in the GET method of an HTTP request. A successful attack would enable the control of the registers $s0 to $s8, $ra, and $sp by sending a specially crafted HTTP request packet to the httpd process.

 

Report 4: reported 06/20/2025

Author(s): xiaobor123  – VULdb Disclosure

Disclosure:  CVE-2025-6291 : (Link) : D-Link DIR-825 HTTP POST Request do_file stack-based overflow

Description: A vulnerability, which was classified as critical, was found in D-Link DIR-825 2.03. This affects the function do_file of the component HTTP POST Request Handler. The manipulation leads to a stack-based buffer overflow.

CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

CVSS:

Score

Severity

Version

Vector String

8.7

HIGH

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

8.8

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

8.8

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

9.0

2.0

AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

 

Affected: All models, Derivative Models, All Revisions, and All Firmware

 

 

Report 5: reported 07/08/2025

Author(s): iC0rner (VulDB User)   VULdb Disclosure

Disclosure:  CVE-2025-7206 : (Link): D-Link DIR-825 httpd switch_language.cgi sub_410DDC stack-based overflow

Description: A vulnerability, which was classified as critical, has been found in D-Link DIR-825 firmware  v2.10. This issue affects the function sub_410DDC of the file switch_language.cgi of the component httpd. The manipulation of the argument Language leads to a stack-based buffer overflow.

CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

CVSS:

Score

Severity

Version

Vector String

9.3

CRITICAL

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

9.8

CRITICAL

3.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

9.8

CRITICAL

3.0

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R

10.0

2.0

AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Affected All models, Derivative Models, All Revisions, and All Firmware

 

Accused Model

Model

Region

Hardware Revision

End of Service Life

Fixed Firmware

Legacy Website

Last Updated

DIR-825

All Regions

H/W Revisions Ax thru Ix*

01/01/2016 for Rev Bx

Not Available

Yes (Link)

06/24/2024

 ** H/W revision Jx is still available in some non-US regions, it is not affected by this vulnerability.

 

Recommendation for End of Support /End of Life Products


From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to the evolution of technology, market demands, innovations, or product efficiencies based on new technologies, or when the product matures over time and should be replaced by functionally superior technology.

 

 For US Consumer

If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is usually no further extended support or development for it.

 

Typically, for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support have ceased. 

 

D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please ensure the device has the most recent firmware, frequently update its unique password for web configuration access, and always enable WIFI encryption with a unique password.