An OS command injection vulnerability exists in various legacy D-Link routers—including DIR-300 rev B and DIR-600 (firmware ≤ 2.13 and ≤ 2.14b01, respectively)—due to improper input handling in the unauthenticated command.php endpoint. By sending specially crafted POST requests, a remote attacker can execute arbitrary shell commands with root privileges, allowing full takeover of the device. This includes launching services such as Telnet, exfiltrating credentials, modifying system configuration, and disrupting availability. The flaw stems from the lack of authentication and inadequate sanitation of the cmd parameter.
History

Mon, 04 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 04 Aug 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-300
D-link dir-600
Vendors & Products D-link
D-link dir-300
D-link dir-600

Fri, 01 Aug 2025 21:00:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability exists in various legacy D-Link routers—including DIR-300 rev B and DIR-600 (firmware ≤ 2.13 and ≤ 2.14b01, respectively)—due to improper input handling in the unauthenticated command.php endpoint. By sending specially crafted POST requests, a remote attacker can execute arbitrary shell commands with root privileges, allowing full takeover of the device. This includes launching services such as Telnet, exfiltrating credentials, modifying system configuration, and disrupting availability. The flaw stems from the lack of authentication and inadequate sanitation of the cmd parameter.
Title D-Link Devices command.php Unauthenticated RCE
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-01T20:39:20.417Z

Updated: 2025-08-04T14:22:11.273Z

Reserved: 2025-08-01T14:08:41.917Z

Link: CVE-2013-10048

cve-icon Vulnrichment

Updated: 2025-08-04T14:22:02.588Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-01T21:15:26.567

Modified: 2025-08-04T15:15:29.257

Link: CVE-2013-10048

cve-icon Redhat

No data.