OS Command Injection Vulnerability in D-Link DIR-816L Routers
CVE-2025-9727
Key Information:
Badges
What is CVE-2025-9727?
A vulnerability has been identified in the D-Link DIR-816L routers that could allow an attacker to execute arbitrary operating system commands remotely. This flaw is found in the function soapcgi_main within the /soap.cgi file, where improper handling of the 'service' argument can be exploited for command injection. The exploitation potential poses significant risks, especially for devices that are no longer supported by D-Link. The exploit has been publicly shared, increasing the urgency for users with affected models to take immediate action to secure their devices.
Affected Version(s)
DIR-816L 206b01
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved