CVE-2025-9752: OS Command Injection in D-Link DIR-852
A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-9752 is a security vulnerability identified in the D-Link DIR-852 router, specifically version 1.00CN B09. The vulnerability resides in the SOAP Service component, within the soapcgi_main function of the soap.cgi file. It is an OS command injection flaw triggered by manipulation of the 'service' argument. This vulnerability allows an unauthenticated remote attacker to execute arbitrary operating system commands on the affected device without requiring user interaction. The flaw arises because input passed to the 'service' parameter is not properly sanitized before being used in system-level commands, enabling injection of malicious commands. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild to date. Importantly, the affected product version is no longer supported by the vendor, meaning no official patches or updates are available to remediate this issue. The CVSS v4.0 base score is 6.9, indicating a medium severity level, with attack vector being network-based, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vulnerability's exploitation could allow attackers to gain control over the router, potentially leading to network compromise, interception or manipulation of traffic, or use of the device as a foothold for further attacks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to those still using the affected D-Link DIR-852 router version 1.00CN B09, which is an older and unsupported model. Exploitation could lead to unauthorized remote control of the router, enabling attackers to intercept sensitive communications, manipulate network traffic, or pivot into internal networks. This is particularly concerning for small and medium enterprises or home office environments where such routers are more commonly deployed. The lack of vendor support means no official patches are available, increasing the risk of prolonged exposure. Additionally, compromised routers could be enlisted in botnets or used to launch attacks against other targets, impacting broader network security. However, the medium severity and limited scope reduce the likelihood of widespread critical impact across large enterprises with modern infrastructure. Still, the threat to confidentiality and integrity of network communications and potential availability disruptions should not be underestimated.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate practical steps to mitigate this vulnerability. First, identify all devices running the affected D-Link DIR-852 firmware version 1.00CN B09 through network asset inventories and scanning tools. Replace or upgrade these devices to newer, supported models with updated firmware that addresses this and other vulnerabilities. If replacement is not immediately feasible, restrict remote access to the router's management interfaces by implementing network segmentation and firewall rules to limit exposure to untrusted networks, especially the internet. Disable SOAP services or any unnecessary remote management features on the device to reduce the attack surface. Monitor network traffic for unusual patterns that may indicate exploitation attempts. Additionally, educate users about the risks of using unsupported hardware and encourage timely hardware lifecycle management. For critical environments, consider deploying network intrusion detection systems (NIDS) capable of detecting command injection attempts targeting SOAP services.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-9752: OS Command Injection in D-Link DIR-852
Description
A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-9752 is a security vulnerability identified in the D-Link DIR-852 router, specifically version 1.00CN B09. The vulnerability resides in the SOAP Service component, within the soapcgi_main function of the soap.cgi file. It is an OS command injection flaw triggered by manipulation of the 'service' argument. This vulnerability allows an unauthenticated remote attacker to execute arbitrary operating system commands on the affected device without requiring user interaction. The flaw arises because input passed to the 'service' parameter is not properly sanitized before being used in system-level commands, enabling injection of malicious commands. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild to date. Importantly, the affected product version is no longer supported by the vendor, meaning no official patches or updates are available to remediate this issue. The CVSS v4.0 base score is 6.9, indicating a medium severity level, with attack vector being network-based, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vulnerability's exploitation could allow attackers to gain control over the router, potentially leading to network compromise, interception or manipulation of traffic, or use of the device as a foothold for further attacks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to those still using the affected D-Link DIR-852 router version 1.00CN B09, which is an older and unsupported model. Exploitation could lead to unauthorized remote control of the router, enabling attackers to intercept sensitive communications, manipulate network traffic, or pivot into internal networks. This is particularly concerning for small and medium enterprises or home office environments where such routers are more commonly deployed. The lack of vendor support means no official patches are available, increasing the risk of prolonged exposure. Additionally, compromised routers could be enlisted in botnets or used to launch attacks against other targets, impacting broader network security. However, the medium severity and limited scope reduce the likelihood of widespread critical impact across large enterprises with modern infrastructure. Still, the threat to confidentiality and integrity of network communications and potential availability disruptions should not be underestimated.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate practical steps to mitigate this vulnerability. First, identify all devices running the affected D-Link DIR-852 firmware version 1.00CN B09 through network asset inventories and scanning tools. Replace or upgrade these devices to newer, supported models with updated firmware that addresses this and other vulnerabilities. If replacement is not immediately feasible, restrict remote access to the router's management interfaces by implementing network segmentation and firewall rules to limit exposure to untrusted networks, especially the internet. Disable SOAP services or any unnecessary remote management features on the device to reduce the attack surface. Monitor network traffic for unusual patterns that may indicate exploitation attempts. Additionally, educate users about the risks of using unsupported hardware and encourage timely hardware lifecycle management. For critical environments, consider deploying network intrusion detection systems (NIDS) capable of detecting command injection attempts targeting SOAP services.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-31T08:18:37.778Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b4ea0cad5a09ad00c5da88
Added to database: 9/1/2025, 12:34:20 AM
Last enriched: 9/8/2025, 6:50:30 AM
Last updated: 10/16/2025, 6:38:42 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62413: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in emqx MQTTX
MediumCVE-2025-60639: n/a
HighCVE-2025-61330: n/a
CriticalCVE-2025-62409: CWE-476: NULL Pointer Dereference in envoyproxy envoy
MediumCVE-2025-60641: n/a
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.