OS Command Injection Vulnerability in D-Link DIR-860L Router
CVE-2025-9026
Key Information:
Badges
What is CVE-2025-9026?
A serious OS command injection vulnerability has been discovered in the D-Link DIR-860L router, specifically within the Simple Service Discovery Protocol component. The flaw is present in the 'ssdpcgi_main' function of the file located at 'htdocs/cgibin' and allows for remote exploitation. Attackers can execute arbitrary commands on the device, posing significant risks, particularly for users with products that are no longer supported by D-Link. Immediate action is recommended for mitigating potential exploitation of this vulnerability.
Affected Version(s)
DIR-860L 2.04.B04
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved