Skip to main content

CVE-2025-5492: Command Injection in D-Link DI-500WF-WT

Medium
VulnerabilityCVE-2025-5492cvecve-2025-5492
Published: Tue Jun 03 2025 (06/03/2025, 10:31:04 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DI-500WF-WT

Description

A vulnerability has been found in D-Link DI-500WF-WT up to 20250511 and classified as critical. Affected by this vulnerability is the function sub_456DE8 of the file /msp_info.htm?flag=cmd of the component /usr/sbin/jhttpd. The manipulation of the argument cmd leads to command injection. The attack can be launched remotely.

AI-Powered Analysis

AILast updated: 07/11/2025, 07:18:08 UTC

Technical Analysis

CVE-2025-5492 is a command injection vulnerability identified in the D-Link DI-500WF-WT wireless router, specifically affecting firmware versions up to 20250511. The vulnerability resides in the function sub_456DE8 within the /msp_info.htm?flag=cmd endpoint, which is part of the /usr/sbin/jhttpd component. This function improperly handles the 'cmd' argument, allowing an attacker to inject arbitrary commands that the system executes. The vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). Although the CVSS score is 5.3 (medium severity), the ability to execute arbitrary commands remotely poses a significant risk. The vulnerability impacts the confidentiality, integrity, and availability of the affected device, as attackers could potentially execute malicious commands to manipulate device settings, intercept or redirect network traffic, or disrupt network connectivity. No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. The vulnerability is classified as medium severity primarily due to the requirement of low privileges (PR:L), meaning some level of access is needed, but no user interaction is required. The lack of authentication requirement for the command injection endpoint increases the attack surface, making it a critical concern for network security.

Potential Impact

For European organizations, this vulnerability presents a tangible threat to network infrastructure security, especially for those relying on D-Link DI-500WF-WT routers in their environments. Successful exploitation could lead to unauthorized command execution, enabling attackers to compromise router configurations, intercept sensitive data, or launch further attacks within the network. This could result in data breaches, service disruptions, and potential lateral movement within corporate networks. Given that routers serve as critical gateways for internet access, exploitation could also facilitate man-in-the-middle attacks or network traffic manipulation. The medium severity rating suggests that while exploitation requires some privilege level, the absence of user interaction and remote attack vector increases the risk. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if such vulnerabilities are exploited. Additionally, the lack of available patches necessitates immediate attention to alternative mitigation strategies to protect network integrity and confidentiality.

Mitigation Recommendations

1. Immediate network segmentation: Isolate affected D-Link DI-500WF-WT devices from critical network segments to limit potential lateral movement in case of compromise. 2. Access control: Restrict management interface access to trusted IP addresses only, using firewall rules or router ACLs, to reduce exposure of the vulnerable endpoint. 3. Disable or restrict access to the /msp_info.htm endpoint if possible, or implement web application firewall (WAF) rules to detect and block suspicious command injection patterns targeting the 'cmd' parameter. 4. Monitor network traffic and router logs for unusual commands or access patterns indicative of exploitation attempts. 5. Engage with D-Link support channels to obtain firmware updates or patches as soon as they become available, and plan for timely deployment. 6. Consider replacing affected devices with models that have confirmed security updates if patching is delayed. 7. Implement network intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts on router management interfaces. 8. Educate network administrators on the risks and signs of exploitation to ensure rapid incident response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-03T04:24:47.346Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683ed1c6182aa0cae27139d9

Added to database: 6/3/2025, 10:43:18 AM

Last enriched: 7/11/2025, 7:18:08 AM

Last updated: 8/4/2025, 4:40:31 PM

Views: 28

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats