D-Link DNS-343 ShareCenter devices running firmware versions up to and including 1.05 contain a command injection vulnerability in the Mail Test functionality. The web maintenance script posts to the internal goForm endpoint '/goform/Mail_Test' and uses several form parameters directly in a call to a system email utility without proper input validation. An unauthenticated remote attacker can supply crafted form data that injects shell commands, resulting in execution as root on the device. NOTE: The DNS-343 product line has been declared end-of-life.
Metrics
Affected Vendors & Products
References
History
Thu, 30 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link dns-343 |
|
| Vendors & Products |
D-link
D-link dns-343 |
Wed, 29 Oct 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | D-Link DNS-343 ShareCenter devices running firmware versions up to and including 1.05 contain a command injection vulnerability in the Mail Test functionality. The web maintenance script posts to the internal goForm endpoint '/goform/Mail_Test' and uses several form parameters directly in a call to a system email utility without proper input validation. An unauthenticated remote attacker can supply crafted form data that injects shell commands, resulting in execution as root on the device. NOTE: The DNS-343 product line has been declared end-of-life. | |
| Title | D-Link DNS-343 ShareCenter <= 1.05 Command Injection via /goform/Mail_Test | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-10-29T18:39:03.581Z
Updated: 2025-10-30T17:37:43.230Z
Reserved: 2025-10-29T18:09:35.000Z
Link: CVE-2018-25120
Updated: 2025-10-30T17:37:40.262Z
Status : Awaiting Analysis
Published: 2025-10-29T19:15:36.953
Modified: 2025-10-30T15:03:13.440
Link: CVE-2018-25120
No data.