Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15391: Command Injection in D-Link DIR-806A

0
Medium
VulnerabilityCVE-2025-15391cvecve-2025-15391
Published: Wed Dec 31 2025 (12/31/2025, 17:32:07 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-806A

Description

A weakness has been identified in D-Link DIR-806A 100CNb11. Affected is the function ssdpcgi_main of the component SSDP Request Handler. This manipulation causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 01/07/2026, 20:34:36 UTC

Technical Analysis

CVE-2025-15391 is a command injection vulnerability identified in the D-Link DIR-806A 100CNb11 router model. The flaw resides in the ssdpcgi_main function of the SSDP (Simple Service Discovery Protocol) Request Handler component. SSDP is used for network device discovery, and improper input validation in this function allows an attacker to inject and execute arbitrary system commands remotely. The vulnerability requires no authentication or user interaction, making it accessible to remote attackers scanning for vulnerable devices. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the ease of exploitation (network attack vector, low attack complexity) but limited impact scope due to the product being out of support and the absence of known active exploitation. Since the product is no longer maintained, no official patches or firmware updates are available, increasing the risk of exploitation over time. The public availability of exploit code further raises the threat level. Successful exploitation can lead to full compromise of the router, allowing attackers to manipulate network traffic, intercept sensitive data, or launch further attacks on connected systems. The vulnerability affects only the specific firmware version 100CNb11, limiting the affected population but still significant given the widespread use of D-Link routers in home and small office environments.

Potential Impact

For European organizations, particularly small businesses and residential users relying on the D-Link DIR-806A 100CNb11 router, this vulnerability can lead to unauthorized remote control of network infrastructure. Attackers could intercept confidential communications, alter network configurations, or disrupt internet connectivity, impacting confidentiality, integrity, and availability. The lack of vendor support means no patches are forthcoming, increasing the risk of exploitation over time. This is especially concerning for organizations with limited IT resources that may not regularly update or replace networking equipment. The vulnerability could also be leveraged as a foothold for lateral movement within corporate or home networks, potentially exposing sensitive data or enabling further attacks. Given the router’s typical deployment in less monitored environments, detection and response may be delayed, exacerbating potential damage.

Mitigation Recommendations

Since no official patches or firmware updates are available for the affected D-Link DIR-806A 100CNb11 devices, the primary mitigation is to replace the vulnerable routers with supported models that receive regular security updates. Network segmentation should be implemented to isolate vulnerable devices from critical systems and sensitive data. Disable or restrict SSDP services if possible to reduce the attack surface. Employ network intrusion detection systems (NIDS) to monitor for unusual SSDP traffic or command injection patterns. Regularly audit network devices to identify unsupported or outdated hardware. Educate users about the risks of using unsupported devices and encourage timely hardware upgrades. If replacement is not immediately feasible, consider deploying firewall rules to block incoming SSDP requests from untrusted networks. Maintain up-to-date asset inventories to track vulnerable devices and prioritize remediation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-31T08:53:34.322Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695560d9db813ff03ef63216

Added to database: 12/31/2025, 5:43:53 PM

Last enriched: 1/7/2026, 8:34:36 PM

Last updated: 2/7/2026, 3:51:58 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats