Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60676: n/a

0
Unknown
VulnerabilityCVE-2025-60676cvecve-2025-60676
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetNetworkSettings' functionality of prog.cgi, where the 'IPAddress' and 'SubnetMask' parameters are directly concatenated into shell commands executed via system(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

AI-Powered Analysis

AILast updated: 11/13/2025, 19:16:43 UTC

Technical Analysis

CVE-2025-60676 is a critical unauthenticated command injection vulnerability found in the D-Link DIR-878A1 router firmware version FW101B04.bin. The flaw resides in the 'SetNetworkSettings' functionality within the prog.cgi endpoint, where the parameters 'IPAddress' and 'SubnetMask' are directly concatenated into shell commands executed via the system() call without proper input sanitization or validation. This insecure coding practice allows an attacker to inject arbitrary shell commands by crafting malicious HTTP requests targeting these parameters. Since the vulnerability requires no authentication, an attacker can exploit it remotely over the network, potentially gaining full control over the router. This could lead to device compromise, network traffic interception, lateral movement within the network, or use of the device as a pivot point for further attacks. No CVSS score has been assigned yet, and no patches or known exploits have been reported publicly. The vulnerability was reserved on 2025-09-26 and published on 2025-11-13. The lack of authentication and direct command execution make this a highly severe threat to affected devices.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to complete compromise of the affected D-Link DIR-878A1 routers, which are commonly used in small to medium business and home office environments. Attackers could execute arbitrary commands, potentially intercepting or redirecting network traffic, deploying malware, or establishing persistent backdoors. This undermines confidentiality, integrity, and availability of network communications. Given the router’s role as a network gateway, compromise could facilitate lateral movement into internal networks, exposing sensitive data and critical infrastructure. The impact is heightened in sectors with strict data protection requirements such as finance, healthcare, and government. Additionally, widespread exploitation could disrupt internet connectivity and services. The absence of authentication and ease of remote exploitation increase the risk of automated mass scanning and attacks targeting European networks.

Mitigation Recommendations

1. Immediately disable remote management interfaces on affected routers to prevent external exploitation. 2. Segment networks to isolate vulnerable devices from critical infrastructure and sensitive data. 3. Monitor network traffic for unusual HTTP requests targeting prog.cgi or suspicious parameter values. 4. Implement strict firewall rules to restrict access to router management interfaces to trusted IP addresses only. 5. Regularly audit router firmware versions and update to patched versions once available from D-Link. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns. 7. Educate network administrators about this vulnerability and encourage prompt incident response readiness. 8. If possible, replace vulnerable devices with models confirmed to be free of this vulnerability or with vendor support for timely patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69162b1819431ce75c569446

Added to database: 11/13/2025, 7:01:44 PM

Last enriched: 11/13/2025, 7:16:43 PM

Last updated: 11/14/2025, 4:10:24 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats