Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15391: Command Injection in D-Link DIR-806A

0
Medium
VulnerabilityCVE-2025-15391cvecve-2025-15391
Published: Wed Dec 31 2025 (12/31/2025, 17:32:07 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-806A

Description

A weakness has been identified in D-Link DIR-806A 100CNb11. Affected is the function ssdpcgi_main of the component SSDP Request Handler. This manipulation causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 12/31/2025, 17:58:56 UTC

Technical Analysis

CVE-2025-15391 is a medium-severity command injection vulnerability found in the D-Link DIR-806A router, specifically in the SSDP Request Handler component's ssdpcgi_main function. The vulnerability arises due to improper input validation or sanitization in the SSDP CGI interface, allowing remote attackers to inject and execute arbitrary system commands on the device. The attack vector is network-based and requires no authentication or user interaction, making it remotely exploitable over the internet or local network. The affected firmware version is 100CNb11, and the product is no longer supported by D-Link, meaning no official security patches or firmware updates are available to remediate the issue. The CVSS 4.0 vector indicates low complexity and no privileges required, but the impact on confidentiality, integrity, and availability is limited to low or partial, resulting in a medium overall severity score of 5.3. Although no known exploits are currently observed in the wild, public exploit code has been released, increasing the risk of future attacks. Successful exploitation could allow attackers to execute arbitrary commands, potentially gaining control over the router, intercepting or manipulating network traffic, or causing denial of service. The vulnerability affects the router's core network functionality, making it a significant risk for environments relying on this device for internet connectivity or internal network routing. Since the device is unsupported, organizations must consider alternative mitigation strategies such as device replacement or network isolation.

Potential Impact

For European organizations, the impact of CVE-2025-15391 can be significant if the affected D-Link DIR-806A routers are deployed in critical network segments. Exploitation could lead to unauthorized command execution, enabling attackers to manipulate network traffic, intercept sensitive data, disrupt internet connectivity, or pivot to other internal systems. This could compromise confidentiality, integrity, and availability of organizational networks. The lack of vendor support and patches increases the risk, as vulnerable devices remain exposed. Small and medium enterprises or home office environments using this router model are particularly vulnerable due to limited IT security resources. Critical infrastructure sectors such as energy, healthcare, and finance in Europe could face operational disruptions if these routers are part of their network infrastructure. Additionally, the public availability of exploit code raises the likelihood of opportunistic attacks, including from cybercriminals or hacktivists targeting European networks. The medium severity rating reflects a moderate but tangible risk that requires proactive mitigation to prevent potential breaches or service outages.

Mitigation Recommendations

Given the absence of official patches for the unsupported D-Link DIR-806A 100CNb11 firmware, the primary mitigation is to replace the affected devices with currently supported and securely maintained hardware. Organizations should conduct an inventory to identify any deployments of this router model and prioritize their removal. If immediate replacement is not feasible, network segmentation should be implemented to isolate vulnerable routers from critical systems and sensitive data. Disabling SSDP services or restricting access to the SSDP CGI interface via firewall rules can reduce exposure to remote exploitation. Monitoring network traffic for anomalous SSDP requests or unusual command execution patterns can help detect exploitation attempts early. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability may provide additional defense. Regularly updating network device inventories and enforcing strict network access controls will limit the attack surface. Finally, educating users and administrators about the risks of using unsupported network devices is essential to prevent future exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-31T08:53:34.322Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695560d9db813ff03ef63216

Added to database: 12/31/2025, 5:43:53 PM

Last enriched: 12/31/2025, 5:58:56 PM

Last updated: 1/7/2026, 4:12:40 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats