Skip to main content

CVE-2025-10689: Command Injection in D-Link DIR-645

Medium
VulnerabilityCVE-2025-10689cvecve-2025-10689
Published: Thu Sep 18 2025 (09/18/2025, 20:32:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-645

Description

A vulnerability was identified in D-Link DIR-645 105B01. This issue affects the function soapcgi_main of the file /soap.cgi. Such manipulation of the argument service leads to command injection. The attack can be launched remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 09/18/2025, 20:40:28 UTC

Technical Analysis

CVE-2025-10689 is a command injection vulnerability identified in the D-Link DIR-645 router, specifically affecting firmware version 105B01. The flaw resides in the soapcgi_main function within the /soap.cgi endpoint. By manipulating the 'service' argument in requests to this CGI interface, an attacker can inject arbitrary commands that the device executes. This vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. The exploit code is publicly available, increasing the likelihood of exploitation attempts. However, the affected product is no longer supported by D-Link, meaning no official patches or firmware updates are available to remediate the issue. The CVSS 4.0 score is 5.3 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. The vulnerability could allow attackers to execute arbitrary commands on the router, potentially leading to device compromise, network disruption, or pivoting to internal networks. Since the device is an edge router, exploitation could impact network traffic, confidentiality of communications, and availability of internet access for connected users.

Potential Impact

For European organizations, the impact of this vulnerability depends on the presence of the affected D-Link DIR-645 105B01 routers within their network infrastructure. Many small and medium enterprises (SMEs) and home office setups may still use this older router model due to cost or legacy reasons. Successful exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, disrupt internet connectivity, or establish persistent footholds for further attacks. This could lead to data breaches, operational downtime, and compromise of internal systems. Since the device is no longer supported, organizations cannot rely on vendor patches, increasing the risk profile. The medium severity score suggests a moderate risk, but the lack of vendor support and public exploit availability elevate the threat level. European organizations with remote or distributed workforces using these routers at branch offices or home environments are particularly vulnerable. Additionally, critical infrastructure or government entities using this hardware could face targeted attacks aiming to disrupt communications or exfiltrate sensitive data.

Mitigation Recommendations

Given the absence of official patches, mitigation must focus on compensating controls. Organizations should first conduct network asset inventories to identify any D-Link DIR-645 105B01 devices in use. Immediate replacement of these routers with supported, updated hardware is the most effective mitigation. If replacement is not immediately feasible, network segmentation should isolate vulnerable routers from sensitive internal networks to limit attacker lateral movement. Access to the router's management interface and the /soap.cgi endpoint should be restricted via firewall rules to trusted IP addresses only, preferably internal management networks. Monitoring network traffic for unusual requests to /soap.cgi and anomalous command execution patterns can help detect exploitation attempts. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability can provide additional defense. User education to avoid exposing router management interfaces to the internet is critical. Finally, organizations should plan for phased decommissioning of unsupported devices to reduce long-term risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-18T13:18:29.699Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cc6e2bef6beda3cd78d386

Added to database: 9/18/2025, 8:40:11 PM

Last enriched: 9/18/2025, 8:40:28 PM

Last updated: 9/19/2025, 8:11:02 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats