Command Injection Vulnerability in D-Link DNS-343 ShareCenter Devices
CVE-2018-25120
Key Information:
- Vendor
D-link
- Status
- Vendor
- CVE Published:
- 29 October 2025
Badges
What is CVE-2018-25120?
The D-Link DNS-343 ShareCenter devices harbor a command injection weakness in the Mail Test feature, allowing attackers to exploit the web maintenance script. By sending specially crafted form data to the '/goform/Mail_Test' endpoint without proper input sanitization, an unauthenticated remote intruder can execute arbitrary shell commands with root privileges. This vulnerability underscores the importance of secure coding practices, especially in devices that are already end-of-life.
Affected Version(s)
DNS-343 ShareCenter 0 <= 1.05
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved