On December 8, 2025, the agency officially added the vulnerability, tracked as CVE-2022-37055, to its Known Exploited Vulnerabilities (KEV) catalog.
This designation confirms that threat actors are currently exploiting this specific flaw in active cyberattacks, signaling a severe risk to networks that rely on these devices.
The vulnerability in question is a “buffer overflow” flaw, a standard but dangerous software error.
In technical terms, a buffer overflow occurs when a program attempts to write more data to a specific storage area or “buffer” than it has been allocated to hold.
Because the software lacks proper boundary checks, this excess data spills over into adjacent memory blocks.
For D-Link routers, this mechanism creates a critical opening for cybercriminals. Attackers can exploit this data spillover to overwrite the device’s operational instructions.
This manipulation can cause the router to crash, disrupting network availability, or, more alarmingly, allow the attacker to execute malicious code.
Successful exploitation enables hackers to gain administrative control of the router, compromising the confidentiality and integrity of the entire network protected by the device.
A significant complication with this specific alert is the lifecycle status of the affected hardware. Many of the D-Link routers vulnerable to CVE-2022-37055 are classified as End-of-Life (EoL) or End-of-Service (EoS).
This status indicates that the manufacturer has ceased official support for these models and will not release software updates or security patches to address the flaw.
Running unsupported hardware constitutes a major security gamble for any organization. Without official patches, these devices remain permanently vulnerable to the active exploitation campaigns CISA has identified.
Threat actors frequently scan the internet for such legacy devices to recruit them into botnets, networks of infected devices used to launch larger Distributed Denial-of-Service (DDoS) attacks or to serve as entry points for data theft.
In response to this active threat, CISA has mandated that all Federal Civilian Executive Branch (FCEB) agencies address this vulnerability by December 29, 2025.
However, the urgency of the warning extends to private organizations and home users alike.
Given that many impacted models will never receive a patch, CISA’s primary recommendation is to discontinue their use immediately.
Network administrators and home users are strongly advised to disconnect vulnerable D-Link routers from the internet and replace them with supported, secure alternatives.
If a specific vendor mitigation is available for a particular model, it should be applied instantly; otherwise, the device should be considered a liability and removed from the network.
Find this Story Interesting! Follow us on Google News, LinkedIn and X to Get More Instant Update
The post CISA Alerts on D-Link Router Buffer Overflow Flaw Exploited in Active Attacks appeared first on Cyber Security News.
At the very outset of World of Warcraft’s Midnight expansion, we are summoned by an…
At the very outset of World of Warcraft’s Midnight expansion, we are summoned by an…
Nowadays it's quite difficult to find an RTX 5070 Ti prebuilt for under $2,000, and…
The HTC U24 Pro may not be gold, but its design is otherwise awfully similar…
The US Cybersecurity and Infrastructure Security Agency (CISA), which is part of the Department of…
On Thursday morning, I attended a Q&A panel with four top Samsung smartphone executives. Until…
This website uses cookies.