Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9769: Command Injection in D-Link DI-7400G+

0
Low
VulnerabilityCVE-2025-9769cvecve-2025-9769
Published: Mon Sep 01 2025 (09/01/2025, 08:02:07 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DI-7400G+

Description

A security flaw has been discovered in D-Link DI-7400G+ 19.12.25A1. Affected is the function sub_478D28 of the file /mng_platform.asp. The manipulation of the argument addr with the input `echo 12345 > poc.txt` results in command injection. An attack on the physical device is feasible. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 09/01/2025, 08:32:44 UTC

Technical Analysis

CVE-2025-9769 is a command injection vulnerability identified in the D-Link DI-7400G+ router, specifically affecting firmware version 19.12.25A1. The vulnerability resides in the function sub_478D28 within the /mng_platform.asp file. The flaw allows an attacker to manipulate the 'addr' argument by injecting shell commands, such as the example payload `echo 12345 > poc.txt`, which demonstrates the ability to execute arbitrary commands on the device. This type of vulnerability arises due to insufficient input validation or sanitization, enabling attackers to inject and execute system-level commands. The attack vector requires physical access to the device, which limits remote exploitation possibilities. The vulnerability has a CVSS 4.0 score of 2.4, indicating low severity, largely because exploitation requires local access and low privileges, and the impact on confidentiality, integrity, and availability is limited. No known exploits are currently observed in the wild, but a proof-of-concept exploit has been publicly released, increasing the risk of future exploitation. The vulnerability does not require user interaction and does not affect the device's security controls beyond the local context. No patches or vendor advisories have been linked yet, so mitigation currently relies on access control and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-9769 is relatively limited due to the requirement for physical access to the affected device. However, in environments where D-Link DI-7400G+ routers are deployed in unsecured or semi-public areas—such as small offices, retail locations, or branch offices—an attacker with physical proximity could exploit this vulnerability to execute arbitrary commands. This could lead to unauthorized configuration changes, data leakage from the device, or pivoting to other internal network resources. Given the router’s role as a network gateway, compromise could undermine network integrity and availability. The low CVSS score reflects the limited scope and difficulty of exploitation, but organizations should not dismiss the risk, especially in high-security environments or where physical security controls are weak. Additionally, the public availability of an exploit increases the likelihood of opportunistic attacks. European organizations relying on this device should assess their physical security posture and network segmentation to mitigate potential risks.

Mitigation Recommendations

1. Physical Security: Strengthen physical access controls to locations housing D-Link DI-7400G+ devices to prevent unauthorized personnel from interacting with the hardware. 2. Device Replacement or Upgrade: If possible, upgrade to a newer firmware version or replace the device with a model not affected by this vulnerability, as no official patch is currently available. 3. Network Segmentation: Isolate vulnerable devices on separate network segments with strict access controls to limit the impact of a compromised router. 4. Monitoring and Logging: Enable detailed logging on network devices and monitor for unusual command executions or configuration changes indicative of exploitation. 5. Disable Unnecessary Services: Review and disable any unnecessary management interfaces or services that could be leveraged in conjunction with physical access. 6. Vendor Engagement: Engage with D-Link support to seek official patches or mitigation guidance and stay updated on any forthcoming security advisories. 7. Incident Response Preparedness: Develop and test incident response plans that include scenarios involving physical device compromise to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-31T17:10:22.972Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b556a3ad5a09ad00cb6387

Added to database: 9/1/2025, 8:17:39 AM

Last enriched: 9/1/2025, 8:32:44 AM

Last updated: 10/17/2025, 10:26:00 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats