Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9752: OS Command Injection in D-Link DIR-852

0
Medium
VulnerabilityCVE-2025-9752cvecve-2025-9752
Published: Mon Sep 01 2025 (09/01/2025, 00:02:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-852

Description

A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 09/08/2025, 06:50:30 UTC

Technical Analysis

CVE-2025-9752 is a security vulnerability identified in the D-Link DIR-852 router, specifically version 1.00CN B09. The vulnerability resides in the SOAP Service component, within the soapcgi_main function of the soap.cgi file. It is an OS command injection flaw triggered by manipulation of the 'service' argument. This vulnerability allows an unauthenticated remote attacker to execute arbitrary operating system commands on the affected device without requiring user interaction. The flaw arises because input passed to the 'service' parameter is not properly sanitized before being used in system-level commands, enabling injection of malicious commands. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild to date. Importantly, the affected product version is no longer supported by the vendor, meaning no official patches or updates are available to remediate this issue. The CVSS v4.0 base score is 6.9, indicating a medium severity level, with attack vector being network-based, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vulnerability's exploitation could allow attackers to gain control over the router, potentially leading to network compromise, interception or manipulation of traffic, or use of the device as a foothold for further attacks.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to those still using the affected D-Link DIR-852 router version 1.00CN B09, which is an older and unsupported model. Exploitation could lead to unauthorized remote control of the router, enabling attackers to intercept sensitive communications, manipulate network traffic, or pivot into internal networks. This is particularly concerning for small and medium enterprises or home office environments where such routers are more commonly deployed. The lack of vendor support means no official patches are available, increasing the risk of prolonged exposure. Additionally, compromised routers could be enlisted in botnets or used to launch attacks against other targets, impacting broader network security. However, the medium severity and limited scope reduce the likelihood of widespread critical impact across large enterprises with modern infrastructure. Still, the threat to confidentiality and integrity of network communications and potential availability disruptions should not be underestimated.

Mitigation Recommendations

Given the absence of official patches, European organizations should take immediate practical steps to mitigate this vulnerability. First, identify all devices running the affected D-Link DIR-852 firmware version 1.00CN B09 through network asset inventories and scanning tools. Replace or upgrade these devices to newer, supported models with updated firmware that addresses this and other vulnerabilities. If replacement is not immediately feasible, restrict remote access to the router's management interfaces by implementing network segmentation and firewall rules to limit exposure to untrusted networks, especially the internet. Disable SOAP services or any unnecessary remote management features on the device to reduce the attack surface. Monitor network traffic for unusual patterns that may indicate exploitation attempts. Additionally, educate users about the risks of using unsupported hardware and encourage timely hardware lifecycle management. For critical environments, consider deploying network intrusion detection systems (NIDS) capable of detecting command injection attempts targeting SOAP services.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-31T08:18:37.778Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b4ea0cad5a09ad00c5da88

Added to database: 9/1/2025, 12:34:20 AM

Last enriched: 9/8/2025, 6:50:30 AM

Last updated: 10/16/2025, 6:38:42 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats