Skip to main content

CVE-2025-4341: Command Injection in D-Link DIR-880L

Medium
VulnerabilityCVE-2025-4341cvecve-2025-4341
Published: Tue May 06 2025 (05/06/2025, 08:31:05 UTC)
Source: CVE
Vendor/Project: D-Link
Product: DIR-880L

Description

A vulnerability classified as critical was found in D-Link DIR-880L up to 104WWb01. Affected by this vulnerability is the function sub_16570 of the file /htdocs/ssdpcgi of the component Request Header Handler. The manipulation of the argument HTTP_ST/REMOTE_ADDR/REMOTE_PORT/SERVER_ID leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 07/06/2025, 19:09:33 UTC

Technical Analysis

CVE-2025-4341 is a command injection vulnerability identified in the D-Link DIR-880L router firmware version 104WWb01 and earlier. The vulnerability resides in the function sub_16570 within the /htdocs/ssdpcgi file, specifically in the Request Header Handler component. The flaw arises from improper sanitization of certain HTTP request arguments, including HTTP_ST, REMOTE_ADDR, REMOTE_PORT, and SERVER_ID. An attacker can manipulate these arguments to inject arbitrary commands that the device executes on the underlying operating system. This vulnerability can be exploited remotely without requiring user interaction or authentication, making it a significant risk. However, the affected product version is no longer supported by the vendor, and no official patches have been released. Although the CVSS 4.0 base score is 5.3 (medium severity), the ability to execute arbitrary commands remotely without authentication elevates the risk profile. The vulnerability does not affect confidentiality, integrity, or availability to a high degree individually but collectively poses a moderate threat, especially in environments where these routers are still in use. No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the likelihood of future attacks. The lack of vendor support means organizations must rely on alternative mitigation strategies such as device replacement or network segmentation to reduce exposure.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the continued deployment of the affected D-Link DIR-880L routers. Compromise of these devices could allow attackers to execute arbitrary commands, potentially leading to unauthorized access to internal networks, data exfiltration, or use of the device as a foothold for further attacks. This could disrupt business operations, degrade network performance, or expose sensitive information. Given that the product is no longer supported, organizations may face challenges in securing these devices through firmware updates. The risk is heightened in small and medium enterprises or home office environments where such consumer-grade routers are more prevalent and may lack rigorous security controls. Additionally, the vulnerability could be leveraged in botnet campaigns or distributed denial-of-service (DDoS) attacks, indirectly impacting European organizations by degrading internet infrastructure or services. The medium CVSS score reflects moderate risk, but the absence of authentication and user interaction requirements means exploitation is relatively straightforward, increasing the threat level in practice.

Mitigation Recommendations

Since no official patches are available due to the product being out of support, European organizations should prioritize the following mitigations: 1) Immediate replacement of affected D-Link DIR-880L routers with supported, security-updated models to eliminate the vulnerability vector. 2) If replacement is not immediately feasible, isolate affected devices on segmented network zones with strict firewall rules to limit inbound access to the router’s management interfaces and SSDP services. 3) Disable any unnecessary services or remote management features on the router to reduce the attack surface. 4) Monitor network traffic for unusual patterns or command injection attempts targeting HTTP headers associated with the vulnerability. 5) Employ network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts of CVE-2025-4341. 6) Educate users and administrators about the risks of using unsupported hardware and the importance of timely device lifecycle management. 7) Maintain an inventory of network devices to identify and track vulnerable equipment proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-05T16:54:08.791Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda9ed

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/6/2025, 7:09:33 PM

Last updated: 8/9/2025, 12:51:48 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats