CVE-2025-4341: Command Injection in D-Link DIR-880L
A vulnerability classified as critical was found in D-Link DIR-880L up to 104WWb01. Affected by this vulnerability is the function sub_16570 of the file /htdocs/ssdpcgi of the component Request Header Handler. The manipulation of the argument HTTP_ST/REMOTE_ADDR/REMOTE_PORT/SERVER_ID leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-4341 is a command injection vulnerability identified in the D-Link DIR-880L router firmware version 104WWb01 and earlier. The vulnerability resides in the function sub_16570 within the /htdocs/ssdpcgi file, specifically in the Request Header Handler component. The flaw arises from improper sanitization of certain HTTP request arguments, including HTTP_ST, REMOTE_ADDR, REMOTE_PORT, and SERVER_ID. An attacker can manipulate these arguments to inject arbitrary commands that the device executes on the underlying operating system. This vulnerability can be exploited remotely without requiring user interaction or authentication, making it a significant risk. However, the affected product version is no longer supported by the vendor, and no official patches have been released. Although the CVSS 4.0 base score is 5.3 (medium severity), the ability to execute arbitrary commands remotely without authentication elevates the risk profile. The vulnerability does not affect confidentiality, integrity, or availability to a high degree individually but collectively poses a moderate threat, especially in environments where these routers are still in use. No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the likelihood of future attacks. The lack of vendor support means organizations must rely on alternative mitigation strategies such as device replacement or network segmentation to reduce exposure.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the continued deployment of the affected D-Link DIR-880L routers. Compromise of these devices could allow attackers to execute arbitrary commands, potentially leading to unauthorized access to internal networks, data exfiltration, or use of the device as a foothold for further attacks. This could disrupt business operations, degrade network performance, or expose sensitive information. Given that the product is no longer supported, organizations may face challenges in securing these devices through firmware updates. The risk is heightened in small and medium enterprises or home office environments where such consumer-grade routers are more prevalent and may lack rigorous security controls. Additionally, the vulnerability could be leveraged in botnet campaigns or distributed denial-of-service (DDoS) attacks, indirectly impacting European organizations by degrading internet infrastructure or services. The medium CVSS score reflects moderate risk, but the absence of authentication and user interaction requirements means exploitation is relatively straightforward, increasing the threat level in practice.
Mitigation Recommendations
Since no official patches are available due to the product being out of support, European organizations should prioritize the following mitigations: 1) Immediate replacement of affected D-Link DIR-880L routers with supported, security-updated models to eliminate the vulnerability vector. 2) If replacement is not immediately feasible, isolate affected devices on segmented network zones with strict firewall rules to limit inbound access to the router’s management interfaces and SSDP services. 3) Disable any unnecessary services or remote management features on the router to reduce the attack surface. 4) Monitor network traffic for unusual patterns or command injection attempts targeting HTTP headers associated with the vulnerability. 5) Employ network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of CVE-2025-4341. 6) Educate users and administrators about the risks of using unsupported hardware and the importance of timely device lifecycle management. 7) Maintain an inventory of network devices to identify and track vulnerable equipment proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-4341: Command Injection in D-Link DIR-880L
Description
A vulnerability classified as critical was found in D-Link DIR-880L up to 104WWb01. Affected by this vulnerability is the function sub_16570 of the file /htdocs/ssdpcgi of the component Request Header Handler. The manipulation of the argument HTTP_ST/REMOTE_ADDR/REMOTE_PORT/SERVER_ID leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-4341 is a command injection vulnerability identified in the D-Link DIR-880L router firmware version 104WWb01 and earlier. The vulnerability resides in the function sub_16570 within the /htdocs/ssdpcgi file, specifically in the Request Header Handler component. The flaw arises from improper sanitization of certain HTTP request arguments, including HTTP_ST, REMOTE_ADDR, REMOTE_PORT, and SERVER_ID. An attacker can manipulate these arguments to inject arbitrary commands that the device executes on the underlying operating system. This vulnerability can be exploited remotely without requiring user interaction or authentication, making it a significant risk. However, the affected product version is no longer supported by the vendor, and no official patches have been released. Although the CVSS 4.0 base score is 5.3 (medium severity), the ability to execute arbitrary commands remotely without authentication elevates the risk profile. The vulnerability does not affect confidentiality, integrity, or availability to a high degree individually but collectively poses a moderate threat, especially in environments where these routers are still in use. No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the likelihood of future attacks. The lack of vendor support means organizations must rely on alternative mitigation strategies such as device replacement or network segmentation to reduce exposure.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the continued deployment of the affected D-Link DIR-880L routers. Compromise of these devices could allow attackers to execute arbitrary commands, potentially leading to unauthorized access to internal networks, data exfiltration, or use of the device as a foothold for further attacks. This could disrupt business operations, degrade network performance, or expose sensitive information. Given that the product is no longer supported, organizations may face challenges in securing these devices through firmware updates. The risk is heightened in small and medium enterprises or home office environments where such consumer-grade routers are more prevalent and may lack rigorous security controls. Additionally, the vulnerability could be leveraged in botnet campaigns or distributed denial-of-service (DDoS) attacks, indirectly impacting European organizations by degrading internet infrastructure or services. The medium CVSS score reflects moderate risk, but the absence of authentication and user interaction requirements means exploitation is relatively straightforward, increasing the threat level in practice.
Mitigation Recommendations
Since no official patches are available due to the product being out of support, European organizations should prioritize the following mitigations: 1) Immediate replacement of affected D-Link DIR-880L routers with supported, security-updated models to eliminate the vulnerability vector. 2) If replacement is not immediately feasible, isolate affected devices on segmented network zones with strict firewall rules to limit inbound access to the router’s management interfaces and SSDP services. 3) Disable any unnecessary services or remote management features on the router to reduce the attack surface. 4) Monitor network traffic for unusual patterns or command injection attempts targeting HTTP headers associated with the vulnerability. 5) Employ network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of CVE-2025-4341. 6) Educate users and administrators about the risks of using unsupported hardware and the importance of timely device lifecycle management. 7) Maintain an inventory of network devices to identify and track vulnerable equipment proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-05T16:54:08.791Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981cc4522896dcbda9ed
Added to database: 5/21/2025, 9:08:44 AM
Last enriched: 7/6/2025, 7:09:33 PM
Last updated: 8/9/2025, 12:51:48 AM
Views: 12
Related Threats
CVE-2025-8852: Information Exposure Through Error Message in WuKongOpenSource WukongCRM
MediumCVE-2025-8864: CWE-532 Insertion of Sensitive Information into Log File in YugabyteDB Inc YugabyteDB Anywhere
MediumCVE-2025-8851: Stack-based Buffer Overflow in LibTIFF
MediumCVE-2025-8863: CWE-319 Cleartext Transmission of Sensitive Information in YugabyteDB Inc YugabyteDB
HighCVE-2025-8847: Cross Site Scripting in yangzongzhuan RuoYi
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.