Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12313: Command Injection in D-Link DI-7001 MINI

0
Medium
VulnerabilityCVE-2025-12313cvecve-2025-12313
Published: Mon Oct 27 2025 (10/27/2025, 20:02:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DI-7001 MINI

Description

CVE-2025-12313 is a medium-severity command injection vulnerability affecting the D-Link DI-7001 MINI router firmware versions 19. 09. 19A1 and 24. 04. 18B1. The flaw exists in an unspecified function within the /msp_info. htm file, where manipulation of the 'cmd' argument allows remote attackers to execute arbitrary commands without authentication or user interaction. Although no known exploits are currently observed in the wild, the vulnerability is publicly disclosed, increasing the risk of exploitation. The CVSS 4. 0 score is 5.

AI-Powered Analysis

AILast updated: 10/27/2025, 20:38:15 UTC

Technical Analysis

CVE-2025-12313 is a command injection vulnerability identified in the D-Link DI-7001 MINI router firmware versions 19.09.19A1 and 24.04.18B1. The vulnerability resides in an unspecified function within the /msp_info.htm web interface file, where an attacker can manipulate the 'cmd' parameter to inject and execute arbitrary system commands remotely. This flaw does not require authentication or user interaction, making it accessible to any remote attacker with network access to the device's management interface. The vulnerability allows attackers to compromise the device's confidentiality, integrity, and availability by executing arbitrary commands, potentially leading to full device takeover, network pivoting, or disruption of services. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild, the public disclosure increases the risk of exploitation. The lack of a patch link suggests that a firmware update may not yet be available, requiring interim mitigations. The vulnerability affects embedded device firmware commonly deployed in small office/home office (SOHO) environments and possibly in enterprise edge deployments, making it a significant risk for organizations relying on this hardware for network connectivity and security.

Potential Impact

For European organizations, exploitation of CVE-2025-12313 could lead to unauthorized remote command execution on affected D-Link DI-7001 MINI routers, resulting in device compromise. This could allow attackers to intercept or manipulate network traffic, disrupt connectivity, or use the device as a foothold for lateral movement within corporate networks. The impact is particularly critical for organizations relying on these routers for perimeter security or remote access. Confidentiality could be breached through data interception, integrity compromised by altering device configurations or network traffic, and availability affected by denial-of-service conditions caused by malicious commands. The medium CVSS score reflects moderate risk, but the absence of authentication requirements and user interaction lowers barriers to exploitation. European entities in sectors such as telecommunications, critical infrastructure, and small to medium enterprises using these devices are at heightened risk. Additionally, the public disclosure of the vulnerability increases the likelihood of exploitation attempts, necessitating prompt attention.

Mitigation Recommendations

1. Immediately restrict network access to the management interface of the D-Link DI-7001 MINI routers, ideally limiting it to trusted internal IP addresses or VPN connections. 2. Monitor network traffic for unusual command injection patterns or unexpected outbound connections originating from these devices. 3. If available, apply the latest firmware updates from D-Link addressing this vulnerability; if no patch is currently released, maintain close contact with the vendor for updates. 4. Implement network segmentation to isolate vulnerable devices from critical network segments, reducing potential lateral movement. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection attempts targeting the /msp_info.htm interface. 6. Conduct regular audits of device configurations and logs to identify unauthorized changes or suspicious activities. 7. Consider replacing affected devices with models from vendors with active security support if patches are delayed. 8. Educate network administrators about the vulnerability and ensure secure configuration practices are followed to minimize exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-26T17:19:28.833Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ffd495ba6dffc5e20c6585

Added to database: 10/27/2025, 8:22:45 PM

Last enriched: 10/27/2025, 8:38:15 PM

Last updated: 10/27/2025, 11:09:13 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats