CVE-2025-14659: Command Injection in D-Link DIR-860LB1
A vulnerability was detected in D-Link DIR-860LB1 and DIR-868LB1 203b01/203b03. Affected is an unknown function of the component DHCP Daemon. The manipulation of the argument Hostname results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-14659 is a command injection vulnerability identified in the DHCP daemon component of D-Link DIR-860LB1 and DIR-868LB1 routers running firmware versions 203b01 and 203b03. The vulnerability arises from improper sanitization of the Hostname argument within DHCP requests, allowing an attacker to inject arbitrary shell commands. This flaw can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) highlights that the attack can be launched over the network with low complexity and no user involvement, but requires low privileges on the device. Successful exploitation could lead to full compromise of the router, enabling attackers to execute arbitrary commands, potentially gaining control over the device, intercepting or redirecting network traffic, or launching further attacks within the network. The vulnerability affects specific firmware versions, and no official patches have been linked yet, though the exploit code is publicly available, increasing the urgency for mitigation. This vulnerability is critical for environments relying on these routers for network perimeter or internal segmentation.
Potential Impact
For European organizations, exploitation of CVE-2025-14659 could result in severe network security breaches. Compromised routers could allow attackers to intercept sensitive communications, manipulate DNS or routing configurations, and pivot into internal networks, threatening confidentiality and integrity of data. Availability could also be impacted if attackers disrupt DHCP services or overload the device. Organizations using these D-Link models in home offices, small businesses, or branch offices are particularly at risk. The exposure is heightened in sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government. The public availability of exploit code increases the likelihood of opportunistic attacks, including by cybercriminals and state-sponsored actors targeting European networks. The vulnerability could also be leveraged in botnet campaigns or ransomware attacks, amplifying its impact.
Mitigation Recommendations
Immediate mitigation steps include isolating affected devices from untrusted networks and restricting DHCP traffic to trusted sources only. Network segmentation should be enforced to limit the reach of compromised routers. Organizations should monitor network traffic for unusual DHCP requests or command injection indicators. Since no official patches are currently linked, contacting D-Link support for firmware updates or advisories is critical. If firmware updates become available, prompt application is essential. As an interim measure, disabling DHCP server functionality on vulnerable devices and using alternative DHCP servers can reduce risk. Implementing network access controls and intrusion detection systems tuned to detect DHCP anomalies can provide additional defense. Regular inventory and auditing of network devices to identify vulnerable models and firmware versions will aid in prioritizing remediation efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-14659: Command Injection in D-Link DIR-860LB1
Description
A vulnerability was detected in D-Link DIR-860LB1 and DIR-868LB1 203b01/203b03. Affected is an unknown function of the component DHCP Daemon. The manipulation of the argument Hostname results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-14659 is a command injection vulnerability identified in the DHCP daemon component of D-Link DIR-860LB1 and DIR-868LB1 routers running firmware versions 203b01 and 203b03. The vulnerability arises from improper sanitization of the Hostname argument within DHCP requests, allowing an attacker to inject arbitrary shell commands. This flaw can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) highlights that the attack can be launched over the network with low complexity and no user involvement, but requires low privileges on the device. Successful exploitation could lead to full compromise of the router, enabling attackers to execute arbitrary commands, potentially gaining control over the device, intercepting or redirecting network traffic, or launching further attacks within the network. The vulnerability affects specific firmware versions, and no official patches have been linked yet, though the exploit code is publicly available, increasing the urgency for mitigation. This vulnerability is critical for environments relying on these routers for network perimeter or internal segmentation.
Potential Impact
For European organizations, exploitation of CVE-2025-14659 could result in severe network security breaches. Compromised routers could allow attackers to intercept sensitive communications, manipulate DNS or routing configurations, and pivot into internal networks, threatening confidentiality and integrity of data. Availability could also be impacted if attackers disrupt DHCP services or overload the device. Organizations using these D-Link models in home offices, small businesses, or branch offices are particularly at risk. The exposure is heightened in sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government. The public availability of exploit code increases the likelihood of opportunistic attacks, including by cybercriminals and state-sponsored actors targeting European networks. The vulnerability could also be leveraged in botnet campaigns or ransomware attacks, amplifying its impact.
Mitigation Recommendations
Immediate mitigation steps include isolating affected devices from untrusted networks and restricting DHCP traffic to trusted sources only. Network segmentation should be enforced to limit the reach of compromised routers. Organizations should monitor network traffic for unusual DHCP requests or command injection indicators. Since no official patches are currently linked, contacting D-Link support for firmware updates or advisories is critical. If firmware updates become available, prompt application is essential. As an interim measure, disabling DHCP server functionality on vulnerable devices and using alternative DHCP servers can reduce risk. Implementing network access controls and intrusion detection systems tuned to detect DHCP anomalies can provide additional defense. Regular inventory and auditing of network devices to identify vulnerable models and firmware versions will aid in prioritizing remediation efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-13T13:20:46.547Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693eaea151e054acf3354728
Added to database: 12/14/2025, 12:33:37 PM
Last enriched: 12/14/2025, 12:40:09 PM
Last updated: 12/15/2025, 3:55:27 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14699: Path Traversal in Municorn FAX App
MediumCVE-2025-14696: Weak Password Recovery in Shenzhen Sixun Software Sixun Shanghui Group Business Management System
MediumCVE-2025-14695: Dynamically-Managed Code Resources in SamuNatsu HaloBot
MediumCVE-2025-14694: SQL Injection in ketr JEPaaS
MediumCVE-2025-14693: Symlink Following in Ugreen DH2100+
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.