Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14659: Command Injection in D-Link DIR-860LB1

0
High
VulnerabilityCVE-2025-14659cvecve-2025-14659
Published: Sun Dec 14 2025 (12/14/2025, 11:32:07 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-860LB1

Description

A vulnerability was detected in D-Link DIR-860LB1 and DIR-868LB1 203b01/203b03. Affected is an unknown function of the component DHCP Daemon. The manipulation of the argument Hostname results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 12/21/2025, 13:12:28 UTC

Technical Analysis

CVE-2025-14659 is a critical command injection vulnerability identified in the DHCP daemon component of D-Link DIR-860LB1 and DIR-868LB1 routers, specifically in firmware versions 203b01 and 203b03. The vulnerability arises from improper sanitization of the Hostname argument within the DHCP service, allowing remote attackers to inject and execute arbitrary system commands on the affected device. This flaw does not require authentication or user interaction, making it highly exploitable over the network. The DHCP daemon typically handles network configuration requests, and exploitation could enable attackers to gain control over the router, manipulate network traffic, or pivot into internal networks. The CVSS 4.0 score of 8.7 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation. While no active exploits have been reported in the wild, the public availability of exploit code increases the likelihood of attacks. The affected devices are commonly deployed in home and small office environments, which often lack robust security controls, amplifying the threat. The absence of official patches at the time of disclosure necessitates immediate risk mitigation through network-level defenses and monitoring. Given the critical role of routers in network infrastructure, successful exploitation could lead to widespread disruption, data breaches, and persistent attacker footholds.

Potential Impact

For European organizations, this vulnerability poses significant risks including unauthorized remote control of network routers, interception or manipulation of network traffic, and potential lateral movement into internal systems. Compromise of these routers can lead to loss of confidentiality through data interception, integrity breaches by altering network configurations or injecting malicious payloads, and availability issues due to denial-of-service conditions or device instability. Small and medium enterprises (SMEs) and home office setups using these D-Link models are particularly vulnerable due to limited security monitoring and patch management capabilities. Critical sectors such as finance, healthcare, and government could face operational disruptions and data breaches if attackers exploit this vulnerability to infiltrate their networks. The public availability of exploit code increases the urgency for European entities to address this threat proactively. Additionally, the vulnerability could be leveraged in botnet campaigns or as a foothold for ransomware attacks, further amplifying its impact.

Mitigation Recommendations

1. Immediate action should focus on isolating affected devices from critical network segments to limit potential lateral movement. 2. Monitor DHCP traffic for anomalous Hostname values or unexpected command execution patterns indicative of exploitation attempts. 3. Implement strict network access controls and firewall rules to restrict inbound traffic to the DHCP service on these routers. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting this vulnerability once available. 5. Engage with D-Link support channels to obtain and apply official firmware updates as soon as they are released. 6. Where patching is delayed, consider replacing vulnerable devices with models not affected by this issue. 7. Educate network administrators and users about the risks and signs of compromise related to router vulnerabilities. 8. Conduct regular security audits and vulnerability scans focusing on network infrastructure devices. 9. Employ network segmentation to separate critical assets from less secure devices such as consumer-grade routers. 10. Maintain up-to-date backups and incident response plans to quickly recover from potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T13:20:46.547Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693eaea151e054acf3354728

Added to database: 12/14/2025, 12:33:37 PM

Last enriched: 12/21/2025, 1:12:28 PM

Last updated: 2/7/2026, 12:26:23 PM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats