The web interface of multiple D-Link routers, including DIR-600 rev B (≤2.14b01) and DIR-300 rev B (≤2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enabling persistent interactive shell access as root.
CVSS
No CVSS.
References
Configurations
No configuration.
History
06 Aug 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/24453 - | |
Summary |
|
05 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-05 20:15
Updated : 2025-08-06 18:15
NVD link : CVE-2013-10069
Mitre link : CVE-2013-10069
CVE.ORG link : CVE-2013-10069
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')