Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60671: n/a

0
Medium
VulnerabilityCVE-2025-60671cvecve-2025-60671
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /var/system/linux_vlan_reinit file. The vulnerability occurs because content read from this file is only partially validated for a prefix and then formatted using vsnprintf() before being executed with system(), allowing an attacker with write access to /var/system/linux_vlan_reinit to execute arbitrary commands on the device.

AI-Powered Analysis

AILast updated: 11/20/2025, 19:37:56 UTC

Technical Analysis

CVE-2025-60671 is a command injection vulnerability identified in the firmware of the D-Link DIR-823G router, specifically version DIR823G_V1.0.2B05_20181207.bin. The flaw exists within the timelycheck and sysconf binaries, which process the /var/system/linux_vlan_reinit file. This file's content is only partially validated for a specific prefix before being formatted using the vsnprintf() function. Subsequently, the formatted string is executed via the system() call without sufficient sanitization, allowing an attacker who can write to the linux_vlan_reinit file to inject arbitrary commands. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command). Exploitation requires the attacker to have write permissions to the target file, which may be achievable through other vulnerabilities or misconfigurations. The CVSS v3.1 base score is 5.4 (medium), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and limited impact on confidentiality and integrity but no impact on availability. No patches or known exploits are currently available, indicating the need for proactive mitigation and monitoring. This vulnerability could allow attackers to execute arbitrary commands on the router, potentially leading to unauthorized access, data leakage, or further network compromise.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized command execution on affected D-Link DIR-823G routers, compromising the confidentiality and integrity of network traffic passing through these devices. Attackers could manipulate router configurations, intercept or redirect traffic, or establish persistent footholds within corporate networks. Although availability is not directly impacted, the breach of router integrity could facilitate broader network attacks or data exfiltration. Organizations relying on these routers for critical network infrastructure, especially in small to medium enterprises or branch offices, may face increased risk. The vulnerability's requirement for write access to a system file limits exploitation to attackers with some level of prior access or insider threat capabilities, but it remains a significant risk if combined with other vulnerabilities or weak access controls. The absence of patches increases exposure until firmware updates are released. Given the widespread use of D-Link routers in Europe, the threat could affect diverse sectors including government, finance, and telecommunications.

Mitigation Recommendations

To mitigate CVE-2025-60671, European organizations should immediately audit and restrict write permissions to the /var/system/linux_vlan_reinit file on all affected D-Link DIR-823G routers, ensuring only trusted system processes have access. Network segmentation and strict access controls should be enforced to limit administrative access to router management interfaces. Implement continuous monitoring and alerting for unauthorized changes to critical system files and unusual command execution patterns on routers. Employ network intrusion detection systems (NIDS) to detect anomalous traffic indicative of exploitation attempts. Organizations should also maintain an inventory of all D-Link DIR-823G devices and track firmware versions to prioritize updates once patches become available. If possible, consider temporary replacement or isolation of vulnerable devices in high-risk environments. Additionally, review and harden router configurations to minimize exposure, disable unnecessary services, and enforce strong authentication mechanisms. Coordination with D-Link for timely patch deployment is essential once a fix is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69162015cdc01d126425d77e

Added to database: 11/13/2025, 6:14:45 PM

Last enriched: 11/20/2025, 7:37:56 PM

Last updated: 11/22/2025, 6:47:06 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats