CVE-2025-60673: n/a
An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDMZSettings' functionality, where the 'IPAddress' parameter in prog.cgi is stored in NVRAM and later used by librcm.so to construct iptables commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.
AI Analysis
Technical Summary
CVE-2025-60673 is a command injection vulnerability identified in the D-Link DIR-878A1 router firmware version FW101B04.bin. The vulnerability exists in the 'SetDMZSettings' functionality exposed via the prog.cgi interface. Specifically, the 'IPAddress' parameter is accepted from HTTP requests and stored directly into the router's NVRAM without proper input validation or sanitization. Subsequently, the stored IP address is used by the shared library librcm.so to construct iptables firewall commands, which are executed through the twsystem() function. Because twsystem() executes shell commands, an attacker can inject arbitrary shell commands by manipulating the 'IPAddress' parameter. This flaw is exploitable remotely without any authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating command injection. Although no public exploits are currently known, the medium CVSS score of 6.5 reflects the potential for partial confidentiality and integrity impact without affecting availability. Successful exploitation could allow attackers to alter firewall rules, execute arbitrary commands, or pivot within the network, compromising device and network security. The lack of available patches at the time of publication increases the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for those relying on the D-Link DIR-878A1 router in their infrastructure. Exploitation could lead to unauthorized command execution, allowing attackers to manipulate firewall settings, bypass security controls, or deploy malware within the network. This could result in data leakage, unauthorized access to internal resources, or disruption of network operations. Given the unauthenticated nature of the exploit, attackers can remotely compromise devices without prior access, increasing the attack surface. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if exploited. Additionally, compromised routers could be leveraged as footholds for broader attacks or as part of botnets targeting other critical infrastructure. The medium severity suggests that while availability impact is low, confidentiality and integrity risks are non-trivial and warrant prompt attention.
Mitigation Recommendations
1. Immediate mitigation should include restricting remote management interfaces to trusted networks only, disabling WAN-side access to the router's web interface if possible. 2. Network administrators should implement strict input validation and filtering at network boundaries to detect and block suspicious HTTP requests targeting prog.cgi or similar endpoints. 3. Employ network segmentation to isolate vulnerable devices from critical assets, limiting potential lateral movement. 4. Monitor router logs and network traffic for unusual patterns indicative of command injection attempts or unauthorized configuration changes. 5. If vendor patches become available, prioritize timely firmware updates to address the vulnerability. 6. As a temporary workaround, consider disabling the 'SetDMZSettings' functionality if feasible or replacing affected devices with models not susceptible to this flaw. 7. Conduct regular vulnerability scans to identify exposed devices and remediate accordingly. 8. Educate IT staff on recognizing signs of exploitation and maintaining secure router configurations.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-60673: n/a
Description
An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDMZSettings' functionality, where the 'IPAddress' parameter in prog.cgi is stored in NVRAM and later used by librcm.so to construct iptables commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.
AI-Powered Analysis
Technical Analysis
CVE-2025-60673 is a command injection vulnerability identified in the D-Link DIR-878A1 router firmware version FW101B04.bin. The vulnerability exists in the 'SetDMZSettings' functionality exposed via the prog.cgi interface. Specifically, the 'IPAddress' parameter is accepted from HTTP requests and stored directly into the router's NVRAM without proper input validation or sanitization. Subsequently, the stored IP address is used by the shared library librcm.so to construct iptables firewall commands, which are executed through the twsystem() function. Because twsystem() executes shell commands, an attacker can inject arbitrary shell commands by manipulating the 'IPAddress' parameter. This flaw is exploitable remotely without any authentication or user interaction, making it highly accessible to attackers scanning for vulnerable devices. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating command injection. Although no public exploits are currently known, the medium CVSS score of 6.5 reflects the potential for partial confidentiality and integrity impact without affecting availability. Successful exploitation could allow attackers to alter firewall rules, execute arbitrary commands, or pivot within the network, compromising device and network security. The lack of available patches at the time of publication increases the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for those relying on the D-Link DIR-878A1 router in their infrastructure. Exploitation could lead to unauthorized command execution, allowing attackers to manipulate firewall settings, bypass security controls, or deploy malware within the network. This could result in data leakage, unauthorized access to internal resources, or disruption of network operations. Given the unauthenticated nature of the exploit, attackers can remotely compromise devices without prior access, increasing the attack surface. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if exploited. Additionally, compromised routers could be leveraged as footholds for broader attacks or as part of botnets targeting other critical infrastructure. The medium severity suggests that while availability impact is low, confidentiality and integrity risks are non-trivial and warrant prompt attention.
Mitigation Recommendations
1. Immediate mitigation should include restricting remote management interfaces to trusted networks only, disabling WAN-side access to the router's web interface if possible. 2. Network administrators should implement strict input validation and filtering at network boundaries to detect and block suspicious HTTP requests targeting prog.cgi or similar endpoints. 3. Employ network segmentation to isolate vulnerable devices from critical assets, limiting potential lateral movement. 4. Monitor router logs and network traffic for unusual patterns indicative of command injection attempts or unauthorized configuration changes. 5. If vendor patches become available, prioritize timely firmware updates to address the vulnerability. 6. As a temporary workaround, consider disabling the 'SetDMZSettings' functionality if feasible or replacing affected devices with models not susceptible to this flaw. 7. Conduct regular vulnerability scans to identify exposed devices and remediate accordingly. 8. Educate IT staff on recognizing signs of exploitation and maintaining secure router configurations.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69162b1819431ce75c56943a
Added to database: 11/13/2025, 7:01:44 PM
Last enriched: 11/20/2025, 7:40:22 PM
Last updated: 1/7/2026, 4:16:59 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.