CVE-2025-5492: Command Injection in D-Link DI-500WF-WT
A vulnerability has been found in D-Link DI-500WF-WT up to 20250511 and classified as critical. Affected by this vulnerability is the function sub_456DE8 of the file /msp_info.htm?flag=cmd of the component /usr/sbin/jhttpd. The manipulation of the argument cmd leads to command injection. The attack can be launched remotely.
AI Analysis
Technical Summary
CVE-2025-5492 is a command injection vulnerability identified in the D-Link DI-500WF-WT wireless router, specifically affecting firmware versions up to 20250511. The vulnerability resides in the function sub_456DE8 within the /msp_info.htm?flag=cmd endpoint, which is part of the /usr/sbin/jhttpd component. This function improperly handles the 'cmd' argument, allowing an attacker to inject arbitrary commands that the system executes. The vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). Although the CVSS score is 5.3 (medium severity), the ability to execute arbitrary commands remotely poses a significant risk. The vulnerability impacts the confidentiality, integrity, and availability of the affected device, as attackers could potentially execute malicious commands to manipulate device settings, intercept or redirect network traffic, or disrupt network connectivity. No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. The vulnerability is classified as medium severity primarily due to the requirement of low privileges (PR:L), meaning some level of access is needed, but no user interaction is required. The lack of authentication requirement for the command injection endpoint increases the attack surface, making it a critical concern for network security.
Potential Impact
For European organizations, this vulnerability presents a tangible threat to network infrastructure security, especially for those relying on D-Link DI-500WF-WT routers in their environments. Successful exploitation could lead to unauthorized command execution, enabling attackers to compromise router configurations, intercept sensitive data, or launch further attacks within the network. This could result in data breaches, service disruptions, and potential lateral movement within corporate networks. Given that routers serve as critical gateways for internet access, exploitation could also facilitate man-in-the-middle attacks or network traffic manipulation. The medium severity rating suggests that while exploitation requires some privilege level, the absence of user interaction and remote attack vector increases the risk. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if such vulnerabilities are exploited. Additionally, the lack of available patches necessitates immediate attention to alternative mitigation strategies to protect network integrity and confidentiality.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected D-Link DI-500WF-WT devices from critical network segments to limit potential lateral movement in case of compromise. 2. Access control: Restrict management interface access to trusted IP addresses only, using firewall rules or router ACLs, to reduce exposure of the vulnerable endpoint. 3. Disable or restrict access to the /msp_info.htm endpoint if possible, or implement web application firewall (WAF) rules to detect and block suspicious command injection patterns targeting the 'cmd' parameter. 4. Monitor network traffic and router logs for unusual commands or access patterns indicative of exploitation attempts. 5. Engage with D-Link support channels to obtain firmware updates or patches as soon as they become available, and plan for timely deployment. 6. Consider replacing affected devices with models that have confirmed security updates if patching is delayed. 7. Implement network intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts on router management interfaces. 8. Educate network administrators on the risks and signs of exploitation to ensure rapid incident response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5492: Command Injection in D-Link DI-500WF-WT
Description
A vulnerability has been found in D-Link DI-500WF-WT up to 20250511 and classified as critical. Affected by this vulnerability is the function sub_456DE8 of the file /msp_info.htm?flag=cmd of the component /usr/sbin/jhttpd. The manipulation of the argument cmd leads to command injection. The attack can be launched remotely.
AI-Powered Analysis
Technical Analysis
CVE-2025-5492 is a command injection vulnerability identified in the D-Link DI-500WF-WT wireless router, specifically affecting firmware versions up to 20250511. The vulnerability resides in the function sub_456DE8 within the /msp_info.htm?flag=cmd endpoint, which is part of the /usr/sbin/jhttpd component. This function improperly handles the 'cmd' argument, allowing an attacker to inject arbitrary commands that the system executes. The vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). Although the CVSS score is 5.3 (medium severity), the ability to execute arbitrary commands remotely poses a significant risk. The vulnerability impacts the confidentiality, integrity, and availability of the affected device, as attackers could potentially execute malicious commands to manipulate device settings, intercept or redirect network traffic, or disrupt network connectivity. No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. The vulnerability is classified as medium severity primarily due to the requirement of low privileges (PR:L), meaning some level of access is needed, but no user interaction is required. The lack of authentication requirement for the command injection endpoint increases the attack surface, making it a critical concern for network security.
Potential Impact
For European organizations, this vulnerability presents a tangible threat to network infrastructure security, especially for those relying on D-Link DI-500WF-WT routers in their environments. Successful exploitation could lead to unauthorized command execution, enabling attackers to compromise router configurations, intercept sensitive data, or launch further attacks within the network. This could result in data breaches, service disruptions, and potential lateral movement within corporate networks. Given that routers serve as critical gateways for internet access, exploitation could also facilitate man-in-the-middle attacks or network traffic manipulation. The medium severity rating suggests that while exploitation requires some privilege level, the absence of user interaction and remote attack vector increases the risk. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if such vulnerabilities are exploited. Additionally, the lack of available patches necessitates immediate attention to alternative mitigation strategies to protect network integrity and confidentiality.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected D-Link DI-500WF-WT devices from critical network segments to limit potential lateral movement in case of compromise. 2. Access control: Restrict management interface access to trusted IP addresses only, using firewall rules or router ACLs, to reduce exposure of the vulnerable endpoint. 3. Disable or restrict access to the /msp_info.htm endpoint if possible, or implement web application firewall (WAF) rules to detect and block suspicious command injection patterns targeting the 'cmd' parameter. 4. Monitor network traffic and router logs for unusual commands or access patterns indicative of exploitation attempts. 5. Engage with D-Link support channels to obtain firmware updates or patches as soon as they become available, and plan for timely deployment. 6. Consider replacing affected devices with models that have confirmed security updates if patching is delayed. 7. Implement network intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts on router management interfaces. 8. Educate network administrators on the risks and signs of exploitation to ensure rapid incident response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-03T04:24:47.346Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683ed1c6182aa0cae27139d9
Added to database: 6/3/2025, 10:43:18 AM
Last enriched: 7/11/2025, 7:18:08 AM
Last updated: 8/4/2025, 4:40:31 PM
Views: 28
Related Threats
CVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalCVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.