CVE-2025-5620: OS Command Injection in D-Link DIR-816
A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-5620 is a security vulnerability identified in the D-Link DIR-816 router, specifically version 1.10CNB05. The flaw exists in the setipsec_config function within the /goform/setipsec_config endpoint. This vulnerability arises from improper sanitization of the localIP and remoteIP parameters, which allows an attacker to inject arbitrary OS commands. Because the vulnerable function processes these parameters without adequate validation, an attacker can remotely execute commands on the underlying operating system with the privileges of the affected service. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. Although the CVSS v4.0 score is 6.9, categorized as medium severity, the potential for remote command execution typically elevates concern. However, it is important to note that this vulnerability affects only the D-Link DIR-816 model running firmware version 1.10CNB05, which is no longer supported by the vendor. No official patches or updates have been released to address this issue, and no known exploits have been observed in the wild at the time of publication. The public disclosure of the exploit code increases the likelihood of exploitation attempts, especially against unpatched devices still in operation. The vulnerability impacts the confidentiality, integrity, and availability of affected devices, as attackers could execute arbitrary commands, potentially leading to device compromise, network pivoting, or denial of service.
Potential Impact
For European organizations, the impact of CVE-2025-5620 depends largely on the presence and deployment of the affected D-Link DIR-816 routers. If these devices are used within corporate or critical infrastructure networks, the vulnerability could allow attackers to gain unauthorized control over network gateways, leading to data breaches, interception of network traffic, or disruption of network services. The ability to execute OS commands remotely without authentication means attackers could install malware, create persistent backdoors, or disrupt network operations. Given that the product is no longer supported, organizations relying on these devices face increased risk due to the absence of vendor patches. This could be particularly problematic for small and medium enterprises or home office environments where such routers might still be in use. The public availability of exploit code further raises the risk of opportunistic attacks targeting vulnerable devices in Europe, potentially affecting confidentiality and availability of organizational networks.
Mitigation Recommendations
Since no official patches are available due to the product being out of support, European organizations should prioritize the following mitigations: 1) Immediate identification and inventory of all D-Link DIR-816 routers running version 1.10CNB05 within their networks. 2) Replacement of affected devices with supported and updated hardware models to eliminate the vulnerability. 3) If replacement is not immediately feasible, isolate the vulnerable routers from critical network segments and restrict remote management interfaces to trusted IP addresses only. 4) Disable remote administration features on the affected devices to reduce exposure. 5) Implement network-level intrusion detection and prevention systems to monitor for suspicious activities targeting the /goform/setipsec_config endpoint or unusual command execution patterns. 6) Employ network segmentation to limit the impact of a compromised router. 7) Educate IT staff about the risks associated with unsupported hardware and the importance of timely hardware lifecycle management. 8) Regularly monitor threat intelligence feeds for any emerging exploits related to this vulnerability to respond promptly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5620: OS Command Injection in D-Link DIR-816
Description
A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-5620 is a security vulnerability identified in the D-Link DIR-816 router, specifically version 1.10CNB05. The flaw exists in the setipsec_config function within the /goform/setipsec_config endpoint. This vulnerability arises from improper sanitization of the localIP and remoteIP parameters, which allows an attacker to inject arbitrary OS commands. Because the vulnerable function processes these parameters without adequate validation, an attacker can remotely execute commands on the underlying operating system with the privileges of the affected service. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. Although the CVSS v4.0 score is 6.9, categorized as medium severity, the potential for remote command execution typically elevates concern. However, it is important to note that this vulnerability affects only the D-Link DIR-816 model running firmware version 1.10CNB05, which is no longer supported by the vendor. No official patches or updates have been released to address this issue, and no known exploits have been observed in the wild at the time of publication. The public disclosure of the exploit code increases the likelihood of exploitation attempts, especially against unpatched devices still in operation. The vulnerability impacts the confidentiality, integrity, and availability of affected devices, as attackers could execute arbitrary commands, potentially leading to device compromise, network pivoting, or denial of service.
Potential Impact
For European organizations, the impact of CVE-2025-5620 depends largely on the presence and deployment of the affected D-Link DIR-816 routers. If these devices are used within corporate or critical infrastructure networks, the vulnerability could allow attackers to gain unauthorized control over network gateways, leading to data breaches, interception of network traffic, or disruption of network services. The ability to execute OS commands remotely without authentication means attackers could install malware, create persistent backdoors, or disrupt network operations. Given that the product is no longer supported, organizations relying on these devices face increased risk due to the absence of vendor patches. This could be particularly problematic for small and medium enterprises or home office environments where such routers might still be in use. The public availability of exploit code further raises the risk of opportunistic attacks targeting vulnerable devices in Europe, potentially affecting confidentiality and availability of organizational networks.
Mitigation Recommendations
Since no official patches are available due to the product being out of support, European organizations should prioritize the following mitigations: 1) Immediate identification and inventory of all D-Link DIR-816 routers running version 1.10CNB05 within their networks. 2) Replacement of affected devices with supported and updated hardware models to eliminate the vulnerability. 3) If replacement is not immediately feasible, isolate the vulnerable routers from critical network segments and restrict remote management interfaces to trusted IP addresses only. 4) Disable remote administration features on the affected devices to reduce exposure. 5) Implement network-level intrusion detection and prevention systems to monitor for suspicious activities targeting the /goform/setipsec_config endpoint or unusual command execution patterns. 6) Employ network segmentation to limit the impact of a compromised router. 7) Educate IT staff about the risks associated with unsupported hardware and the importance of timely hardware lifecycle management. 8) Regularly monitor threat intelligence feeds for any emerging exploits related to this vulnerability to respond promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-04T11:10:06.530Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6840da1d182aa0cae2c463a4
Added to database: 6/4/2025, 11:43:25 PM
Last enriched: 7/7/2025, 3:10:44 AM
Last updated: 8/11/2025, 3:35:37 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.