CVE-2025-5492: Command Injection in D-Link DI-500WF-WT
A vulnerability has been found in D-Link DI-500WF-WT up to 20250511 and classified as critical. Affected by this vulnerability is the function sub_456DE8 of the file /msp_info.htm?flag=cmd of the component /usr/sbin/jhttpd. The manipulation of the argument cmd leads to command injection. The attack can be launched remotely.
AI Analysis
Technical Summary
CVE-2025-5492 is a command injection vulnerability identified in the D-Link DI-500WF-WT wireless router, specifically affecting firmware versions up to 20250511. The vulnerability resides in the function sub_456DE8 within the /msp_info.htm?flag=cmd endpoint, which is part of the /usr/sbin/jhttpd component. This function improperly handles the 'cmd' argument, allowing an attacker to inject arbitrary commands that the system executes. The vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). Although the CVSS score is 5.3 (medium severity), the ability to execute arbitrary commands remotely poses a significant risk. The vulnerability impacts the confidentiality, integrity, and availability of the affected device, as attackers could potentially execute malicious commands to manipulate device settings, intercept or redirect network traffic, or disrupt network connectivity. No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. The vulnerability is classified as medium severity primarily due to the requirement of low privileges (PR:L), meaning some level of access is needed, but no user interaction is required. The lack of authentication requirement for the command injection endpoint increases the attack surface, making it a critical concern for network security.
Potential Impact
For European organizations, this vulnerability presents a tangible threat to network infrastructure security, especially for those relying on D-Link DI-500WF-WT routers in their environments. Successful exploitation could lead to unauthorized command execution, enabling attackers to compromise router configurations, intercept sensitive data, or launch further attacks within the network. This could result in data breaches, service disruptions, and potential lateral movement within corporate networks. Given that routers serve as critical gateways for internet access, exploitation could also facilitate man-in-the-middle attacks or network traffic manipulation. The medium severity rating suggests that while exploitation requires some privilege level, the absence of user interaction and remote attack vector increases the risk. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if such vulnerabilities are exploited. Additionally, the lack of available patches necessitates immediate attention to alternative mitigation strategies to protect network integrity and confidentiality.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected D-Link DI-500WF-WT devices from critical network segments to limit potential lateral movement in case of compromise. 2. Access control: Restrict management interface access to trusted IP addresses only, using firewall rules or router ACLs, to reduce exposure of the vulnerable endpoint. 3. Disable or restrict access to the /msp_info.htm endpoint if possible, or implement web application firewall (WAF) rules to detect and block suspicious command injection patterns targeting the 'cmd' parameter. 4. Monitor network traffic and router logs for unusual commands or access patterns indicative of exploitation attempts. 5. Engage with D-Link support channels to obtain firmware updates or patches as soon as they become available, and plan for timely deployment. 6. Consider replacing affected devices with models that have confirmed security updates if patching is delayed. 7. Implement network intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts on router management interfaces. 8. Educate network administrators on the risks and signs of exploitation to ensure rapid incident response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5492: Command Injection in D-Link DI-500WF-WT
Description
A vulnerability has been found in D-Link DI-500WF-WT up to 20250511 and classified as critical. Affected by this vulnerability is the function sub_456DE8 of the file /msp_info.htm?flag=cmd of the component /usr/sbin/jhttpd. The manipulation of the argument cmd leads to command injection. The attack can be launched remotely.
AI-Powered Analysis
Technical Analysis
CVE-2025-5492 is a command injection vulnerability identified in the D-Link DI-500WF-WT wireless router, specifically affecting firmware versions up to 20250511. The vulnerability resides in the function sub_456DE8 within the /msp_info.htm?flag=cmd endpoint, which is part of the /usr/sbin/jhttpd component. This function improperly handles the 'cmd' argument, allowing an attacker to inject arbitrary commands that the system executes. The vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). Although the CVSS score is 5.3 (medium severity), the ability to execute arbitrary commands remotely poses a significant risk. The vulnerability impacts the confidentiality, integrity, and availability of the affected device, as attackers could potentially execute malicious commands to manipulate device settings, intercept or redirect network traffic, or disrupt network connectivity. No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. The vulnerability is classified as medium severity primarily due to the requirement of low privileges (PR:L), meaning some level of access is needed, but no user interaction is required. The lack of authentication requirement for the command injection endpoint increases the attack surface, making it a critical concern for network security.
Potential Impact
For European organizations, this vulnerability presents a tangible threat to network infrastructure security, especially for those relying on D-Link DI-500WF-WT routers in their environments. Successful exploitation could lead to unauthorized command execution, enabling attackers to compromise router configurations, intercept sensitive data, or launch further attacks within the network. This could result in data breaches, service disruptions, and potential lateral movement within corporate networks. Given that routers serve as critical gateways for internet access, exploitation could also facilitate man-in-the-middle attacks or network traffic manipulation. The medium severity rating suggests that while exploitation requires some privilege level, the absence of user interaction and remote attack vector increases the risk. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if such vulnerabilities are exploited. Additionally, the lack of available patches necessitates immediate attention to alternative mitigation strategies to protect network integrity and confidentiality.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected D-Link DI-500WF-WT devices from critical network segments to limit potential lateral movement in case of compromise. 2. Access control: Restrict management interface access to trusted IP addresses only, using firewall rules or router ACLs, to reduce exposure of the vulnerable endpoint. 3. Disable or restrict access to the /msp_info.htm endpoint if possible, or implement web application firewall (WAF) rules to detect and block suspicious command injection patterns targeting the 'cmd' parameter. 4. Monitor network traffic and router logs for unusual commands or access patterns indicative of exploitation attempts. 5. Engage with D-Link support channels to obtain firmware updates or patches as soon as they become available, and plan for timely deployment. 6. Consider replacing affected devices with models that have confirmed security updates if patching is delayed. 7. Implement network intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts on router management interfaces. 8. Educate network administrators on the risks and signs of exploitation to ensure rapid incident response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-03T04:24:47.346Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683ed1c6182aa0cae27139d9
Added to database: 6/3/2025, 10:43:18 AM
Last enriched: 7/11/2025, 7:18:08 AM
Last updated: 11/22/2025, 7:34:49 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.