Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60698: n/a

0
High
VulnerabilityCVE-2025-60698cvecve-2025-60698
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog.cgi` and `rc` binaries. The `sub_432F60` function in `prog.cgi` stores user-supplied `SetSysLogSettings/IPAddress` values in NVRAM via `nvram_safe_set("SysLogRemote_IPAddress", ...)`. These values are later retrieved in the `sub_448DCC` function of `rc` using `nvram_safe_get` and concatenated into a shell command executed via `twsystem()` without any sanitization. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device through specially crafted HTTP requests to the router's web interface.

AI-Powered Analysis

AILast updated: 11/13/2025, 18:29:37 UTC

Technical Analysis

CVE-2025-60698 is a critical command injection vulnerability found in the D-Link DIR-882 router firmware version DIR882A1_FW102B02. The vulnerability resides in the prog.cgi and rc binaries, where the function sub_432F60 in prog.cgi accepts user-supplied values for SetSysLogSettings/IPAddress and stores them in NVRAM using nvram_safe_set without proper sanitization. Later, the sub_448DCC function in the rc binary retrieves these values via nvram_safe_get and concatenates them directly into a shell command executed through twsystem(), a function that runs system commands. Because the input is not sanitized or validated, an attacker can inject arbitrary shell commands by crafting malicious HTTP requests targeting the router's web interface. The attack vector is remote and unauthenticated, meaning no credentials or user interaction are necessary to exploit the vulnerability. This allows an attacker to execute arbitrary commands with the privileges of the router's system user, potentially leading to full device compromise, network traffic interception, or pivoting to internal networks. The firmware version affected is DIR882A1_FW102B02, but no other versions are specified. Although no public exploits have been reported yet, the nature of the vulnerability and lack of authentication requirements make it highly exploitable once weaponized. The vulnerability was published on November 13, 2025, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for small and medium enterprises and residential users relying on D-Link DIR-882 routers for internet connectivity. Successful exploitation can lead to complete compromise of the router, allowing attackers to intercept, modify, or redirect network traffic, potentially exposing sensitive data and credentials. Attackers could also use the compromised router as a foothold to launch further attacks within the internal network, including lateral movement to critical systems. The lack of authentication and remote exploitability increases the likelihood of automated attacks and worm-like propagation. Disruption of network availability is also possible if attackers execute destructive commands. Given the widespread use of D-Link routers in Europe, the impact could be substantial, affecting confidentiality, integrity, and availability of organizational networks and home users alike.

Mitigation Recommendations

1. Immediately disable remote management and remote access features on affected D-Link DIR-882 routers to reduce exposure to external attackers. 2. Restrict access to the router's web interface to trusted internal IP addresses only, using firewall rules or router access control lists. 3. Monitor network traffic for unusual or suspicious HTTP requests targeting router management interfaces. 4. Segment critical internal networks from the router's management interface to limit potential lateral movement. 5. Regularly check for and apply official firmware updates from D-Link addressing this vulnerability as soon as they are released. 6. If firmware updates are not yet available, consider replacing affected routers with models from vendors with timely security patching. 7. Educate users and administrators about the risks of exposing router management interfaces to the internet and enforce strong network security policies. 8. Employ network intrusion detection systems (NIDS) to detect exploitation attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69162015cdc01d126425d79c

Added to database: 11/13/2025, 6:14:45 PM

Last enriched: 11/13/2025, 6:29:37 PM

Last updated: 11/14/2025, 4:10:38 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats