OS Command Injection Vulnerability in D-Link DI-7300G+ Router
CVE-2025-6896
Key Information:
Badges
What is CVE-2025-6896?
A security flaw has been identified in the D-Link DI-7300G+ router, particularly in the wget_test.asp file. This vulnerability allows attackers to manipulate the 'url' argument, leading to potential OS command injection. The vulnerability can be exploited remotely, allowing malicious actors to execute arbitrary commands on the affected device. Given the public disclosure of this flaw, it is crucial for users of the D-Link DI-7300G+ to take immediate measures to secure their devices to prevent unauthorized access.
Affected Version(s)
DI-7300G+ 19.12.25A1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved