Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60676: n/a

0
Medium
VulnerabilityCVE-2025-60676cvecve-2025-60676
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetNetworkSettings' functionality of prog.cgi, where the 'IPAddress' and 'SubnetMask' parameters are directly concatenated into shell commands executed via system(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

AI-Powered Analysis

AILast updated: 11/20/2025, 19:39:47 UTC

Technical Analysis

CVE-2025-60676 is a command injection vulnerability identified in the D-Link DIR-878A1 router firmware version FW101B04.bin. The flaw exists in the 'SetNetworkSettings' functionality exposed via the prog.cgi interface, where user-supplied parameters 'IPAddress' and 'SubnetMask' are directly concatenated into shell commands executed using the system() call. This unsafe coding practice (CWE-77) allows an attacker to inject arbitrary shell commands by crafting malicious input in these parameters. Crucially, no authentication is required to exploit this vulnerability, and it can be triggered remotely over the network by sending a specially crafted HTTP request to the router. Successful exploitation results in arbitrary command execution with the privileges of the web server process, potentially allowing attackers to manipulate router settings, pivot into internal networks, or deploy further malware. The vulnerability was published on November 13, 2025, with a CVSS v3.1 base score of 6.5, indicating medium severity. The vector metrics are AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N, meaning it is remotely exploitable with low attack complexity, no privileges or user interaction required, and impacts confidentiality and integrity to a limited extent but does not affect availability. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild. The vulnerability highlights a critical security oversight in input validation and command execution within router firmware, emphasizing the need for secure coding practices in embedded device software.

Potential Impact

For European organizations, this vulnerability presents a moderate risk primarily to network security and data integrity. Compromised routers could allow attackers to intercept or manipulate network traffic, alter routing configurations, or establish persistent footholds within corporate or critical infrastructure networks. Although the impact on availability is minimal, the ability to execute arbitrary commands without authentication could facilitate lateral movement or data exfiltration. Organizations relying on D-Link DIR-878A1 routers, especially in sectors such as government, finance, telecommunications, and energy, may face increased exposure to espionage or sabotage attempts. The lack of authentication and remote exploitability means attackers can target these devices from anywhere, increasing the threat surface. Additionally, compromised routers in home or small office environments could be leveraged as part of botnets or to launch attacks against enterprise networks. The absence of known exploits currently limits immediate widespread impact, but the vulnerability's presence in widely deployed consumer and SMB routers necessitates proactive risk management.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level controls: restrict access to router management interfaces from untrusted networks, ideally limiting to internal or VPN-only access. 2. Implement web application firewall (WAF) or intrusion prevention system (IPS) rules to detect and block suspicious HTTP requests targeting the 'SetNetworkSettings' endpoint or containing unusual 'IPAddress' and 'SubnetMask' parameter values. 3. Monitor router logs for anomalous requests or unexpected configuration changes. 4. Engage with D-Link support or vendor channels to obtain firmware updates or patches addressing this vulnerability; if unavailable, consider upgrading to newer, secure router models. 5. Segment networks to isolate vulnerable devices and reduce potential lateral movement. 6. Educate network administrators on the risks of exposing router management interfaces publicly and enforce strong network perimeter defenses. 7. Regularly audit and inventory network devices to identify affected models and firmware versions. 8. Employ network anomaly detection tools to identify unusual command execution patterns or traffic flows indicative of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69162b1819431ce75c569446

Added to database: 11/13/2025, 7:01:44 PM

Last enriched: 11/20/2025, 7:39:47 PM

Last updated: 12/29/2025, 8:15:10 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats