Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14659: Command Injection in D-Link DIR-860LB1

0
High
VulnerabilityCVE-2025-14659cvecve-2025-14659
Published: Sun Dec 14 2025 (12/14/2025, 11:32:07 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-860LB1

Description

A vulnerability was detected in D-Link DIR-860LB1 and DIR-868LB1 203b01/203b03. Affected is an unknown function of the component DHCP Daemon. The manipulation of the argument Hostname results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 12/14/2025, 12:40:09 UTC

Technical Analysis

CVE-2025-14659 is a command injection vulnerability identified in the DHCP daemon component of D-Link DIR-860LB1 and DIR-868LB1 routers running firmware versions 203b01 and 203b03. The vulnerability arises from improper sanitization of the Hostname argument within DHCP requests, allowing an attacker to inject arbitrary shell commands. This flaw can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) highlights that the attack can be launched over the network with low complexity and no user involvement, but requires low privileges on the device. Successful exploitation could lead to full compromise of the router, enabling attackers to execute arbitrary commands, potentially gaining control over the device, intercepting or redirecting network traffic, or launching further attacks within the network. The vulnerability affects specific firmware versions, and no official patches have been linked yet, though the exploit code is publicly available, increasing the urgency for mitigation. This vulnerability is critical for environments relying on these routers for network perimeter or internal segmentation.

Potential Impact

For European organizations, exploitation of CVE-2025-14659 could result in severe network security breaches. Compromised routers could allow attackers to intercept sensitive communications, manipulate DNS or routing configurations, and pivot into internal networks, threatening confidentiality and integrity of data. Availability could also be impacted if attackers disrupt DHCP services or overload the device. Organizations using these D-Link models in home offices, small businesses, or branch offices are particularly at risk. The exposure is heightened in sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government. The public availability of exploit code increases the likelihood of opportunistic attacks, including by cybercriminals and state-sponsored actors targeting European networks. The vulnerability could also be leveraged in botnet campaigns or ransomware attacks, amplifying its impact.

Mitigation Recommendations

Immediate mitigation steps include isolating affected devices from untrusted networks and restricting DHCP traffic to trusted sources only. Network segmentation should be enforced to limit the reach of compromised routers. Organizations should monitor network traffic for unusual DHCP requests or command injection indicators. Since no official patches are currently linked, contacting D-Link support for firmware updates or advisories is critical. If firmware updates become available, prompt application is essential. As an interim measure, disabling DHCP server functionality on vulnerable devices and using alternative DHCP servers can reduce risk. Implementing network access controls and intrusion detection systems tuned to detect DHCP anomalies can provide additional defense. Regular inventory and auditing of network devices to identify vulnerable models and firmware versions will aid in prioritizing remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T13:20:46.547Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693eaea151e054acf3354728

Added to database: 12/14/2025, 12:33:37 PM

Last enriched: 12/14/2025, 12:40:09 PM

Last updated: 12/15/2025, 3:55:27 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats