Command Injection Vulnerability in D-Link DI-7100G C1
CVE-2025-11335

5.1MEDIUM

Key Information:

Vendor

D-link

Vendor
CVE Published:
6 October 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-11335?

A vulnerability has been identified in the D-Link DI-7100G C1 affecting versions up to 20250928, which allows for command injection via remote exploitation. The issue lies in the jhttpd component, specifically within the /msp_info.htm?flag=qos file. An attacker can manipulate the 'iface' argument to execute arbitrary commands on the device. This vulnerability poses significant security risks, especially considering public availability of the exploit.

Affected Version(s)

DI-7100G C1 20250928

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

sheratan (VulDB User)
.
CVE-2025-11335 : Command Injection Vulnerability in D-Link DI-7100G C1