Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11335: Command Injection in D-Link DI-7100G C1

0
Medium
VulnerabilityCVE-2025-11335cvecve-2025-11335
Published: Mon Oct 06 2025 (10/06/2025, 12:32:09 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DI-7100G C1

Description

A weakness has been identified in D-Link DI-7100G C1 up to 20250928. Affected by this vulnerability is the function sub_46409C of the file /msp_info.htm?flag=qos of the component jhttpd. This manipulation of the argument iface causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 10/06/2025, 12:46:56 UTC

Technical Analysis

CVE-2025-11335 is a command injection vulnerability identified in the D-Link DI-7100G C1 router, affecting firmware versions up to 20250928. The flaw exists in the jhttpd web server component, specifically in the function sub_46409C handling requests to /msp_info.htm with the 'flag=qos' parameter. The vulnerability stems from insufficient input validation of the 'iface' argument, which an attacker can manipulate to inject arbitrary OS commands. This injection occurs remotely over the network without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:H). The CVSS score of 5.1 reflects a medium severity, considering the partial privileges required (high privileges) and limited impact on confidentiality, integrity, and availability. The exploit code has been publicly released, increasing the likelihood of exploitation despite no current reports of active attacks. The vulnerability could allow attackers to execute commands on the router, potentially leading to device compromise, network disruption, or pivoting to internal networks. The absence of vendor patches at the time of publication necessitates immediate defensive measures. The vulnerability affects a widely deployed router model used in enterprise and possibly critical infrastructure environments, making it a significant concern for network security teams.

Potential Impact

For European organizations, exploitation of CVE-2025-11335 could lead to unauthorized command execution on network routers, compromising device integrity and potentially allowing attackers to intercept, modify, or disrupt network traffic. This could result in partial loss of confidentiality, integrity, and availability of network services. Given the router's role in managing network traffic, attackers could leverage this vulnerability to establish persistent footholds, conduct lateral movement, or launch further attacks against internal systems. Critical infrastructure sectors relying on these devices, such as telecommunications, government networks, and large enterprises, face increased risk of operational disruption and data breaches. The public availability of exploit code lowers the barrier for attackers, increasing the threat level. Although no active exploitation has been reported, the medium severity rating and ease of remote exploitation without user interaction make this a notable risk for European networks using the affected D-Link devices.

Mitigation Recommendations

1. Immediately inventory and identify all D-Link DI-7100G C1 devices within the network to assess exposure. 2. Restrict network access to the router's management interfaces, especially the /msp_info.htm endpoint, by implementing firewall rules or network segmentation to limit access to trusted administrators only. 3. Monitor network traffic for unusual requests targeting the 'flag=qos' parameter or suspicious command injection patterns. 4. Apply vendor firmware updates or patches as soon as they become available; engage with D-Link support to obtain timelines or beta fixes if possible. 5. If patches are unavailable, consider temporarily disabling or restricting the vulnerable jhttpd service or the affected web interface functionality. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection attempts against this vulnerability. 7. Conduct regular security audits and penetration testing focused on router and network device configurations to identify and remediate similar vulnerabilities. 8. Educate network administrators on the risks of command injection and the importance of secure device management practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-05T15:42:21.663Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e3ba264ffbcd9cf4f20805

Added to database: 10/6/2025, 12:46:30 PM

Last enriched: 10/6/2025, 12:46:56 PM

Last updated: 10/7/2025, 1:35:19 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats