Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15357: Command Injection in D-Link DI-7400G+

0
Medium
VulnerabilityCVE-2025-15357cvecve-2025-15357
Published: Tue Dec 30 2025 (12/30/2025, 21:02:08 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DI-7400G+

Description

A vulnerability was found in D-Link DI-7400G+ 19.12.25A1. This affects an unknown function of the file /msp_info.htm?flag=cmd. The manipulation of the argument cmd results in command injection. The attack can be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 12/30/2025, 22:24:50 UTC

Technical Analysis

CVE-2025-15357 is a command injection vulnerability identified in the D-Link DI-7400G+ router running firmware version 19.12.25A1. The vulnerability resides in an unknown function accessed via the /msp_info.htm endpoint, specifically through the 'cmd' parameter. Improper input validation allows remote attackers to inject arbitrary OS commands, which the device executes with elevated privileges. The attack vector is network-based and does not require authentication or user interaction, increasing the risk of exploitation. The vulnerability could allow attackers to gain control over the router, manipulate network traffic, disrupt services, or use the device as a foothold for further attacks within the internal network. Although the CVSS 4.0 score is 5.3 (medium), the presence of a public exploit increases the urgency for mitigation. No patches have been officially released yet, and no active exploitation has been confirmed. The vulnerability affects only the specified firmware version, limiting the scope but still posing a risk to unpatched devices. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous in exposed network environments.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to significant operational disruptions and data breaches. Compromise of the D-Link DI-7400G+ routers could allow attackers to intercept or manipulate network traffic, degrade network availability, or establish persistent access to internal systems. This is especially critical for organizations relying on these routers as gateways or in perimeter security roles. The ability to execute arbitrary commands remotely without authentication increases the risk of widespread compromise if devices are exposed to the internet or poorly segmented networks. Sensitive sectors such as government, finance, and critical infrastructure in Europe could face espionage, data theft, or sabotage. The medium severity rating suggests moderate impact, but the ease of exploitation and public availability of exploits elevate the threat level. Additionally, the vulnerability could be leveraged in botnet campaigns or lateral movement within corporate networks, amplifying its impact.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the router’s management interface, especially the /msp_info.htm endpoint, by implementing network-level controls such as firewall rules or VPN-only access. Organizations should monitor network traffic for suspicious requests targeting the 'cmd' parameter. Since no official patches are currently available, users should consider temporary device replacement or firmware rollback if a previous secure version exists. Vendors and users must prioritize firmware updates once released by D-Link. Network segmentation should be enforced to isolate vulnerable devices from critical assets. Employing intrusion detection systems (IDS) with signatures for command injection attempts can help detect exploitation attempts. Regular audits of device firmware versions and configurations are essential to identify and remediate vulnerable devices promptly. Finally, educating IT staff about this vulnerability and ensuring incident response plans include scenarios involving router compromise will improve preparedness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-30T07:27:20.480Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450a0db813ff03e2bda6d

Added to database: 12/30/2025, 10:22:24 PM

Last enriched: 12/30/2025, 10:24:50 PM

Last updated: 1/8/2026, 7:21:32 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats