Skip to main content

CVE-2025-4350: Command Injection in D-Link DIR-600L

High
VulnerabilityCVE-2025-4350cvecve-2025-4350
Published: Tue May 06 2025 (05/06/2025, 11:31:06 UTC)
Source: CVE
Vendor/Project: D-Link
Product: DIR-600L

Description

A vulnerability classified as critical was found in D-Link DIR-600L up to 2.07B01. This vulnerability affects the function wake_on_lan. The manipulation of the argument host leads to command injection. The attack can be initiated remotely. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 07/06/2025, 19:12:47 UTC

Technical Analysis

CVE-2025-4350 is a critical command injection vulnerability identified in the D-Link DIR-600L router, specifically affecting firmware versions up to 2.07B01. The vulnerability resides in the wake_on_lan function, where improper sanitization of the 'host' argument allows an attacker to inject arbitrary commands. This flaw enables remote attackers to execute commands on the device without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts the confidentiality, integrity, and availability of the affected device, as attackers can execute arbitrary commands potentially leading to full device compromise. The vulnerability is notable because it affects devices that are no longer supported by the vendor, meaning no official patches or updates are available, increasing the risk for long-term exploitation. Although no known exploits are currently reported in the wild, the high CVSS score of 8.7 and the ease of exploitation make this a significant threat. The vulnerability does not require user interaction and can be triggered remotely over the network, which increases the attack surface. Given the nature of the device—a consumer-grade router—successful exploitation could allow attackers to manipulate network traffic, intercept sensitive data, or use the compromised device as a foothold for further attacks within the network environment.

Potential Impact

For European organizations, the exploitation of this vulnerability could have severe consequences. Many small and medium-sized enterprises (SMEs) and home office setups rely on consumer-grade routers like the D-Link DIR-600L for internet connectivity. A compromised router could lead to interception of sensitive communications, unauthorized access to internal networks, and disruption of business operations. The lack of vendor support means organizations cannot rely on official patches, increasing the risk of persistent exploitation. Additionally, the vulnerability could be leveraged to launch broader attacks such as lateral movement within corporate networks or as part of botnets for distributed denial-of-service (DDoS) attacks. Critical sectors such as finance, healthcare, and government agencies using these devices in less secure environments may face increased risk of data breaches and operational disruptions. The remote and unauthenticated nature of the exploit further exacerbates the threat, as attackers can target vulnerable devices over the internet without needing physical access or user interaction.

Mitigation Recommendations

Given the absence of official patches due to end-of-life status of the affected devices, European organizations should prioritize the following mitigations: 1) Immediate replacement of all D-Link DIR-600L routers with supported and updated models that receive regular security updates. 2) If replacement is not immediately feasible, isolate the vulnerable devices from direct internet exposure by placing them behind a firewall or using network segmentation to limit access to the device's management interface. 3) Disable the wake_on_lan feature entirely if it is not required, as this is the vulnerable function. 4) Monitor network traffic for unusual activity that could indicate exploitation attempts, including unexpected command execution or outbound connections from the router. 5) Implement strict network access controls and restrict management interface access to trusted IP addresses only. 6) Educate users and IT staff about the risks of using unsupported hardware and the importance of timely hardware lifecycle management. 7) Consider deploying network intrusion detection systems (NIDS) capable of detecting command injection patterns or anomalous router behavior. These steps will help mitigate the risk until devices can be fully replaced.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-05T16:58:54.023Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981cc4522896dcbdaa96

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/6/2025, 7:12:47 PM

Last updated: 7/29/2025, 2:27:36 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats