Vulnerabilities

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router’s web interface components, specifically “cgibin” and “hnap_main,” by submitting input that exceeds allocated buffer sizes, leading to memory corruption.

This classic CWE-120 buffer overflow enables remote unauthenticated code execution with high impact on confidentiality, integrity, and availability, as attackers overwrite adjacent memory to inject malicious payloads.

The CVSS v3.1 base score of 9.8 (Critical) reflects its ease of remote exploitation without privileges or user interaction (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A: H).​

Affected models include D-Link Go-RT-AC750 firmware versions GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02, many of which reached end-of-life status without patches.

Threat actors craft oversized HTTP requests to trigger the overflow, potentially hijacking network traffic, stealing data, or using devices as botnet nodes.

Real-world attacks spiked recently, targeting unpatched home and enterprise routers.

CVE ParameterDetails
CVE IDCVE-2022-37055
Vendor/ProductD-Link / Go-RT-AC750 Routers
CVSS Score9.8 (Critical)
CWECWE-120 (Buffer Overflow)
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
KEV Add Date2025-12-08
Due Date2025-12-29
Ransomware LinkUnknown
Patch StatusEoL/EoS; No updates

​Urgent Mitigations

Organizations must scan networks for vulnerable D-Link routers and isolate them immediately, as no vendor firmware fixes exist for EoL models.

CISA urges discontinuation of affected products per BOD 22-01, prioritizing replacement with supported hardware.

Network defenders should deploy web application firewalls to block anomalous HTTP requests to CGI/HNAP endpoints and monitor for signs of exploitation, such as unusual traffic spikes.

Home users facing similar devices should power them off and upgrade to modern alternatives from vendors with active security support.

Enterprises that integrate these routers into supply chains risk lateral movement by attackers post-compromise.

Proactive vulnerability management using CISA’s KEV as a baseline prevents broader impacts from such persistent threats.

Regular firmware audits and segmentation limit exposure until complete replacement.

Follow us on Google News , LinkedIn and X to Get More Instant Updates, Set Cyberpress as a Preferred Source in Google.
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Share
Published by
Varshini

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

3 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

3 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

3 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

3 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

3 months ago

Hackers Abuse AWS IAM Eventual Consistency To Maintain Persistent Access

Attackers can keep access to AWS accounts even after admins delete compromised keys. New research…

3 months ago