All the vulnerabilites related to D-Link - DIR-600
cve-2018-25115
Vulnerability from cvelistv5
Published
2025-08-27 21:24
Modified
2025-08-28 19:45
Severity ?
EPSS score ?
Summary
D-Link DIR-110/412/600/615/645/815 RCE via service.cgi
References
▼ | URL | Tags |
---|---|---|
https://github.com/Cr0n1c/dlink_shell_poc/blob/master/dlink_auth_rce | technical-description, exploit | |
https://www.exploit-db.com/exploits/43496 | exploit | |
https://legacy.us.dlink.com/ | product | |
https://support.dlink.com/EndOfLifePolicy.aspx | product | |
https://www.vulncheck.com/advisories/dlink-dir-rce-service-cgi | third-party-advisory |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2018-25115", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-28T13:53:40.553346Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-28T13:55:16.739Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "service.cgi" ], "product": "DIR-110", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "*" } ] }, { "defaultStatus": "unknown", "modules": [ "service.cgi" ], "product": "DIR-412", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "*" } ] }, { "defaultStatus": "unknown", "modules": [ "service.cgi" ], "product": "DIR-600", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "*" } ] }, { "defaultStatus": "unknown", "modules": [ "service.cgi" ], "product": "DIR-615", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "*" } ] }, { "defaultStatus": "unknown", "modules": [ "service.cgi" ], "product": "DIR-645", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "*" } ] }, { "defaultStatus": "unknown", "modules": [ "service.cgi" ], "product": "DIR-815", "vendor": "D-Link", "versions": [ { "lessThanOrEqual": "Version A 1.3", "status": "affected", "version": "*", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Cr0n1c" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e2025-08-21 UTC.\u003c/span\u003e\u003cbr\u003e" } ], "value": "Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21 UTC." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] }, { "capecId": "CAPEC-137", "descriptions": [ { "lang": "en", "value": "CAPEC-137 Parameter Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 10, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-28T19:45:56.397Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "technical-description", "exploit" ], "url": "https://github.com/Cr0n1c/dlink_shell_poc/blob/master/dlink_auth_rce" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/43496" }, { "tags": [ "product" ], "url": "https://legacy.us.dlink.com/" }, { "tags": [ "product" ], "url": "https://support.dlink.com/EndOfLifePolicy.aspx" }, { "tags": [ "third-party-advisory" ], "url": "https://www.vulncheck.com/advisories/dlink-dir-rce-service-cgi" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "x_known-exploited-vulnerability", "unsupported-when-assigned" ], "title": "D-Link DIR-110/412/600/615/645/815 RCE via service.cgi", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2018-25115", "datePublished": "2025-08-27T21:24:23.427Z", "dateReserved": "2025-08-25T17:39:38.473Z", "dateUpdated": "2025-08-28T19:45:56.397Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-7357
Vulnerability from cvelistv5
Published
2024-08-01 13:00
Modified
2024-08-07 13:55
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
D-Link DIR-600 soap.cgi soapcgi_main os command injection
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.273329 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.273329 | signature, permissions-required | |
https://vuldb.com/?submit.383695 | third-party-advisory | |
https://github.com/BeaCox/IoT_vuln/tree/main/D-Link/DIR-600/soapcgi_main_injection | exploit | |
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10408 | related |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:d-link:dir-600:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dir-600", "vendor": "d-link", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "2.3" }, { "status": "affected", "version": "2.4" }, { "status": "affected", "version": "2.5" }, { "status": "affected", "version": "2.6" }, { "status": "affected", "version": "2.7" }, { "status": "affected", "version": "2.8" }, { "status": "affected", "version": "2.9" }, { "status": "affected", "version": "2.10" }, { "status": "affected", "version": "2.11" }, { "status": "affected", "version": "2.12" }, { "status": "affected", "version": "2.13" }, { "status": "affected", "version": "2.14" }, { "status": "affected", "version": "2.15" }, { "status": "affected", "version": "2.16" }, { "status": "affected", "version": "2.17" }, { "status": "affected", "version": "2.18" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-7357", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-07T13:50:41.237527Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-07T13:55:58.954Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "DIR-600", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "2.3" }, { "status": "affected", "version": "2.4" }, { "status": "affected", "version": "2.5" }, { "status": "affected", "version": "2.6" }, { "status": "affected", "version": "2.7" }, { "status": "affected", "version": "2.8" }, { "status": "affected", "version": "2.9" }, { "status": "affected", "version": "2.10" }, { "status": "affected", "version": "2.11" }, { "status": "affected", "version": "2.12" }, { "status": "affected", "version": "2.13" }, { "status": "affected", "version": "2.14" }, { "status": "affected", "version": "2.15" }, { "status": "affected", "version": "2.16" }, { "status": "affected", "version": "2.17" }, { "status": "affected", "version": "2.18" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "BeaCox (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-600 up to 2.18. It has been rated as critical. This issue affects the function soapcgi_main of the file /soap.cgi. The manipulation of the argument service leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273329 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced." }, { "lang": "de", "value": "Eine Schwachstelle wurde in D-Link DIR-600 bis 2.18 ausgemacht. Sie wurde als kritisch eingestuft. Hierbei geht es um die Funktion soapcgi_main der Datei /soap.cgi. Dank Manipulation des Arguments service mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-01T13:00:09.320Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-273329 | D-Link DIR-600 soap.cgi soapcgi_main os command injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.273329" }, { "name": "VDB-273329 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.273329" }, { "name": "Submit #383695 | D-Link DIR-600 2.18 Command Injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.383695" }, { "tags": [ "exploit" ], "url": "https://github.com/BeaCox/IoT_vuln/tree/main/D-Link/DIR-600/soapcgi_main_injection" }, { "tags": [ "related" ], "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10408" } ], "tags": [ "unsupported-when-assigned" ], "timeline": [ { "lang": "en", "time": "2024-08-01T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2024-08-01T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2024-08-01T08:16:22.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DIR-600 soap.cgi soapcgi_main os command injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2024-7357", "datePublished": "2024-08-01T13:00:09.320Z", "dateReserved": "2024-08-01T06:10:51.582Z", "dateUpdated": "2024-08-07T13:55:58.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-10048
Vulnerability from cvelistv5
Published
2025-08-01 20:39
Modified
2025-08-04 14:22
Severity ?
EPSS score ?
Summary
D-Link Devices command.php Unauthenticated RCE
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2013-10048", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-04T14:21:52.250244Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-04T14:22:11.273Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/27528" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "command.php" ], "product": "DIR-600", "vendor": "D-Link", "versions": [ { "lessThanOrEqual": "2.14b01", "status": "affected", "version": "*", "versionType": "semver" } ] }, { "defaultStatus": "unknown", "modules": [ "command.php" ], "product": "DIR-300", "vendor": "D-Link", "versions": [ { "lessThanOrEqual": "2.13", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Michael Messner" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003c/p\u003e\u003cp\u003eAn OS command injection vulnerability exists in various legacy D-Link routers\u2014including DIR-300 rev B and DIR-600 (firmware \u2264 2.13 and \u2264 2.14b01, respectively)\u2014due to improper input handling in the unauthenticated \u003ccode\u003ecommand.php\u003c/code\u003e endpoint. By sending specially crafted POST requests, a remote attacker can execute arbitrary shell commands with root privileges, allowing full takeover of the device. This includes launching services such as Telnet, exfiltrating credentials, modifying system configuration, and disrupting availability. The flaw stems from the lack of authentication and inadequate sanitation of the \u003ccode\u003ecmd\u003c/code\u003e parameter.\u003c/p\u003e\u003cp\u003e\u003c/p\u003e" } ], "value": "An OS command injection vulnerability exists in various legacy D-Link routers\u2014including DIR-300 rev B and DIR-600 (firmware \u2264 2.13 and \u2264 2.14b01, respectively)\u2014due to improper input handling in the unauthenticated command.php endpoint. By sending specially crafted POST requests, a remote attacker can execute arbitrary shell commands with root privileges, allowing full takeover of the device. This includes launching services such as Telnet, exfiltrating credentials, modifying system configuration, and disrupting availability. The flaw stems from the lack of authentication and inadequate sanitation of the cmd parameter." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-01T20:39:20.417Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "exploit" ], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/24453" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/27528" }, { "tags": [ "technical-description", "exploit" ], "url": "https://web.archive.org/web/20131022221648/http://www.s3cur1ty.de/m1adv2013-003" }, { "tags": [ "third-party-advisory" ], "url": "https://www.vulncheck.com/advisories/d-link-legacy-unauth-rce" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "unsupported-when-assigned" ], "title": "D-Link Devices command.php Unauthenticated RCE", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2013-10048", "datePublished": "2025-08-01T20:39:20.417Z", "dateReserved": "2025-08-01T14:08:41.917Z", "dateUpdated": "2025-08-04T14:22:11.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }