CVE-2025-9026: OS Command Injection in D-Link DIR-860L
A vulnerability was identified in D-Link DIR-860L 2.04.B04. This affects the function ssdpcgi_main of the file htdocs/cgibin of the component Simple Service Discovery Protocol. The manipulation leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-9026 is a security vulnerability identified in the D-Link DIR-860L router, specifically version 2.04.B04. The vulnerability exists in the Simple Service Discovery Protocol (SSDP) component, within the ssdpcgi_main function located in the htdocs/cgibin directory. This flaw allows an attacker to perform OS command injection remotely, meaning that malicious commands can be executed on the underlying operating system without requiring authentication or user interaction. The vulnerability arises from insufficient input validation or sanitization in the SSDP CGI interface, enabling crafted requests to inject arbitrary commands. Although the exploit has been publicly disclosed, there are no known exploits observed in the wild at this time. Importantly, this vulnerability affects only devices that are no longer supported by the vendor, implying that no official patches or firmware updates are available to remediate the issue. The CVSS v4.0 base score is 6.9, categorized as medium severity, reflecting the network attack vector, low complexity, no privileges or user interaction needed, but limited impact on confidentiality, integrity, and availability. The vulnerability's exploitability is high due to remote unauthenticated access, but the scope is limited to the specific D-Link DIR-860L model and version. The lack of vendor support increases the risk for affected users as no official fixes exist, potentially leaving devices exposed to attackers who can leverage this command injection to compromise the device, pivot into internal networks, or disrupt services.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for small and medium enterprises or home offices that still use the affected D-Link DIR-860L routers. Successful exploitation could allow attackers to gain control over the router, leading to interception or manipulation of network traffic, deployment of malware, or use of the device as a foothold for lateral movement within corporate networks. Given that the device is often used as a gateway, compromise could result in data breaches, loss of network integrity, or denial of service conditions. The lack of vendor support means organizations cannot rely on official patches, increasing the risk of prolonged exposure. Additionally, attackers could use compromised routers as part of botnets or for launching further attacks, impacting network availability and reputation. While larger enterprises may have more robust network infrastructure and replacement policies, smaller organizations and residential users in Europe may be disproportionately affected, especially in countries where this router model has higher market penetration. The vulnerability also poses risks to critical infrastructure if such devices are used in less secure environments or by third-party providers.
Mitigation Recommendations
Since no official patches are available due to the end-of-life status of the affected product, organizations should prioritize replacing the D-Link DIR-860L routers with supported, updated models that receive regular security updates. Network administrators should isolate these devices from critical network segments and restrict remote access to the management interfaces, ideally disabling SSDP services if possible. Implementing network-level protections such as firewall rules to block unsolicited inbound traffic targeting the router's management ports can reduce exposure. Monitoring network traffic for unusual patterns or command injection attempts can help detect exploitation attempts early. Employing network segmentation and strict access controls will limit the potential impact if a device is compromised. Additionally, organizations should educate users about the risks of using unsupported hardware and encourage timely hardware upgrades. For environments where immediate replacement is not feasible, deploying compensating controls such as VPNs for remote access and enhanced logging can mitigate risk.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-9026: OS Command Injection in D-Link DIR-860L
Description
A vulnerability was identified in D-Link DIR-860L 2.04.B04. This affects the function ssdpcgi_main of the file htdocs/cgibin of the component Simple Service Discovery Protocol. The manipulation leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-9026 is a security vulnerability identified in the D-Link DIR-860L router, specifically version 2.04.B04. The vulnerability exists in the Simple Service Discovery Protocol (SSDP) component, within the ssdpcgi_main function located in the htdocs/cgibin directory. This flaw allows an attacker to perform OS command injection remotely, meaning that malicious commands can be executed on the underlying operating system without requiring authentication or user interaction. The vulnerability arises from insufficient input validation or sanitization in the SSDP CGI interface, enabling crafted requests to inject arbitrary commands. Although the exploit has been publicly disclosed, there are no known exploits observed in the wild at this time. Importantly, this vulnerability affects only devices that are no longer supported by the vendor, implying that no official patches or firmware updates are available to remediate the issue. The CVSS v4.0 base score is 6.9, categorized as medium severity, reflecting the network attack vector, low complexity, no privileges or user interaction needed, but limited impact on confidentiality, integrity, and availability. The vulnerability's exploitability is high due to remote unauthenticated access, but the scope is limited to the specific D-Link DIR-860L model and version. The lack of vendor support increases the risk for affected users as no official fixes exist, potentially leaving devices exposed to attackers who can leverage this command injection to compromise the device, pivot into internal networks, or disrupt services.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for small and medium enterprises or home offices that still use the affected D-Link DIR-860L routers. Successful exploitation could allow attackers to gain control over the router, leading to interception or manipulation of network traffic, deployment of malware, or use of the device as a foothold for lateral movement within corporate networks. Given that the device is often used as a gateway, compromise could result in data breaches, loss of network integrity, or denial of service conditions. The lack of vendor support means organizations cannot rely on official patches, increasing the risk of prolonged exposure. Additionally, attackers could use compromised routers as part of botnets or for launching further attacks, impacting network availability and reputation. While larger enterprises may have more robust network infrastructure and replacement policies, smaller organizations and residential users in Europe may be disproportionately affected, especially in countries where this router model has higher market penetration. The vulnerability also poses risks to critical infrastructure if such devices are used in less secure environments or by third-party providers.
Mitigation Recommendations
Since no official patches are available due to the end-of-life status of the affected product, organizations should prioritize replacing the D-Link DIR-860L routers with supported, updated models that receive regular security updates. Network administrators should isolate these devices from critical network segments and restrict remote access to the management interfaces, ideally disabling SSDP services if possible. Implementing network-level protections such as firewall rules to block unsolicited inbound traffic targeting the router's management ports can reduce exposure. Monitoring network traffic for unusual patterns or command injection attempts can help detect exploitation attempts early. Employing network segmentation and strict access controls will limit the potential impact if a device is compromised. Additionally, organizations should educate users about the risks of using unsupported hardware and encourage timely hardware upgrades. For environments where immediate replacement is not feasible, deploying compensating controls such as VPNs for remote access and enhanced logging can mitigate risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-14T07:15:30.188Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689f0246ad5a09ad006a5212
Added to database: 8/15/2025, 9:47:50 AM
Last enriched: 8/15/2025, 10:02:55 AM
Last updated: 8/15/2025, 12:46:48 PM
Views: 5
Related Threats
CVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9052: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumCVE-2025-9051: SQL Injection in projectworlds Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.