CVE-2025-4454: Command Injection in D-Link DIR-619L
A vulnerability was found in D-Link DIR-619L 2.04B04. It has been declared as critical. This vulnerability affects the function wake_on_lan. The manipulation of the argument mac leads to command injection. The attack can be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-4454 is a command injection vulnerability identified in the D-Link DIR-619L router, specifically version 2.04B04. The vulnerability resides in the wake_on_lan function, where improper sanitization of the 'mac' argument allows an attacker to inject arbitrary commands. This flaw can be exploited remotely without requiring user interaction or authentication, making it a significant risk. The vulnerability is classified with a CVSS 4.0 base score of 5.3, indicating medium severity. The vector details show that the attack can be launched over the network (AV:N), requires low attack complexity (AC:L), no privileges (PR:L), and no user interaction (UI:N). However, the impact on confidentiality, integrity, and availability is limited (VC:L, VI:L, VA:L), suggesting partial compromise potential. The vulnerability affects only the specified firmware version of a product that is no longer supported by the vendor, meaning no official patches or updates are available. No known exploits are currently reported in the wild. The lack of vendor support increases the risk for affected users, as mitigation options are limited to workarounds or device replacement. The wake_on_lan feature is typically used to remotely power on devices within a local network, but the injection flaw could allow attackers to execute arbitrary system commands on the router, potentially leading to device compromise, network pivoting, or denial of service.
Potential Impact
For European organizations, the impact of this vulnerability depends on the presence and usage of the D-Link DIR-619L router within their network infrastructure. Given that the device is an older, unsupported model, it is more likely to be found in small to medium enterprises or home office environments rather than large enterprises. Successful exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, and potentially use the compromised device as a foothold for further attacks within the network. This could lead to data breaches, disruption of network services, and exposure of sensitive information. The lack of vendor support means organizations cannot rely on official patches, increasing the risk of prolonged exposure. Additionally, since the attack requires no authentication or user interaction, automated scanning and exploitation attempts could target vulnerable devices, increasing the threat level. The overall impact is medium but could escalate if attackers combine this vulnerability with other exploits to achieve broader network compromise.
Mitigation Recommendations
Given the absence of official patches due to discontinued support, European organizations should prioritize the following mitigation steps: 1) Identify and inventory all D-Link DIR-619L devices running firmware version 2.04B04 or earlier. 2) Immediately isolate these devices from critical network segments or restrict their network access to trusted management networks only. 3) Disable the wake_on_lan feature if it is not essential, as this is the vulnerable function. 4) Replace affected devices with currently supported models that receive regular security updates. 5) Implement network-level protections such as firewall rules to block unsolicited inbound traffic to the router’s management interfaces. 6) Monitor network traffic for unusual activity originating from or targeting these routers. 7) Educate users and administrators about the risks of using unsupported hardware and the importance of timely device upgrades. 8) Consider deploying network intrusion detection systems (NIDS) tuned to detect command injection attempts or anomalous wake_on_lan traffic patterns.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-4454: Command Injection in D-Link DIR-619L
Description
A vulnerability was found in D-Link DIR-619L 2.04B04. It has been declared as critical. This vulnerability affects the function wake_on_lan. The manipulation of the argument mac leads to command injection. The attack can be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-4454 is a command injection vulnerability identified in the D-Link DIR-619L router, specifically version 2.04B04. The vulnerability resides in the wake_on_lan function, where improper sanitization of the 'mac' argument allows an attacker to inject arbitrary commands. This flaw can be exploited remotely without requiring user interaction or authentication, making it a significant risk. The vulnerability is classified with a CVSS 4.0 base score of 5.3, indicating medium severity. The vector details show that the attack can be launched over the network (AV:N), requires low attack complexity (AC:L), no privileges (PR:L), and no user interaction (UI:N). However, the impact on confidentiality, integrity, and availability is limited (VC:L, VI:L, VA:L), suggesting partial compromise potential. The vulnerability affects only the specified firmware version of a product that is no longer supported by the vendor, meaning no official patches or updates are available. No known exploits are currently reported in the wild. The lack of vendor support increases the risk for affected users, as mitigation options are limited to workarounds or device replacement. The wake_on_lan feature is typically used to remotely power on devices within a local network, but the injection flaw could allow attackers to execute arbitrary system commands on the router, potentially leading to device compromise, network pivoting, or denial of service.
Potential Impact
For European organizations, the impact of this vulnerability depends on the presence and usage of the D-Link DIR-619L router within their network infrastructure. Given that the device is an older, unsupported model, it is more likely to be found in small to medium enterprises or home office environments rather than large enterprises. Successful exploitation could allow attackers to gain control over the router, intercept or manipulate network traffic, and potentially use the compromised device as a foothold for further attacks within the network. This could lead to data breaches, disruption of network services, and exposure of sensitive information. The lack of vendor support means organizations cannot rely on official patches, increasing the risk of prolonged exposure. Additionally, since the attack requires no authentication or user interaction, automated scanning and exploitation attempts could target vulnerable devices, increasing the threat level. The overall impact is medium but could escalate if attackers combine this vulnerability with other exploits to achieve broader network compromise.
Mitigation Recommendations
Given the absence of official patches due to discontinued support, European organizations should prioritize the following mitigation steps: 1) Identify and inventory all D-Link DIR-619L devices running firmware version 2.04B04 or earlier. 2) Immediately isolate these devices from critical network segments or restrict their network access to trusted management networks only. 3) Disable the wake_on_lan feature if it is not essential, as this is the vulnerable function. 4) Replace affected devices with currently supported models that receive regular security updates. 5) Implement network-level protections such as firewall rules to block unsolicited inbound traffic to the router’s management interfaces. 6) Monitor network traffic for unusual activity originating from or targeting these routers. 7) Educate users and administrators about the risks of using unsupported hardware and the importance of timely device upgrades. 8) Consider deploying network intrusion detection systems (NIDS) tuned to detect command injection attempts or anomalous wake_on_lan traffic patterns.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-08T18:49:19.706Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd7df2
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 3:25:29 AM
Last updated: 11/22/2025, 4:43:51 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.