CVE-2018-25115

Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21 UTC.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-110:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:dlink:dir-412_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-412:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:dlink:dir-600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-600:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:dlink:dir-610_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-610:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:dlink:dir-615_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:dlink:dir-645_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-645:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:dlink:dir-815_firmware:1.03:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-815:-:*:*:*:*:*:*:*

History

24 Sep 2025, 18:03

Type Values Removed Values Added
References () https://github.com/Cr0n1c/dlink_shell_poc/blob/master/dlink_auth_rce - () https://github.com/Cr0n1c/dlink_shell_poc/blob/master/dlink_auth_rce - Exploit
References () https://legacy.us.dlink.com/ - () https://legacy.us.dlink.com/ - Product
References () https://support.dlink.com/EndOfLifePolicy.aspx - () https://support.dlink.com/EndOfLifePolicy.aspx - Product
References () https://www.exploit-db.com/exploits/43496 - () https://www.exploit-db.com/exploits/43496 - Exploit
References () https://www.vulncheck.com/advisories/dlink-dir-rce-service-cgi - () https://www.vulncheck.com/advisories/dlink-dir-rce-service-cgi - Third Party Advisory
CPE cpe:2.3:h:dlink:dir-610:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-645:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-412_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-110:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-815:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-610_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-645_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-815_firmware:1.03:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-615_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-412:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-600:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*
First Time Dlink dir-615 Firmware
Dlink dir-412
Dlink dir-615
Dlink dir-610
Dlink dir-610 Firmware
Dlink dir-645
Dlink dir-815
Dlink dir-110 Firmware
Dlink dir-600 Firmware
Dlink dir-815 Firmware
Dlink dir-645 Firmware
Dlink dir-412 Firmware
Dlink dir-110
Dlink
Dlink dir-600
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

28 Aug 2025, 20:15

Type Values Removed Values Added
Summary (en) Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. (en) Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21 UTC.

27 Aug 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-27 22:15

Updated : 2025-09-24 18:03


NVD link : CVE-2018-25115

Mitre link : CVE-2018-25115

CVE.ORG link : CVE-2018-25115


JSON object : View

Products Affected

dlink

  • dir-412_firmware
  • dir-615
  • dir-600
  • dir-110
  • dir-610_firmware
  • dir-412
  • dir-600_firmware
  • dir-815_firmware
  • dir-645
  • dir-110_firmware
  • dir-815
  • dir-615_firmware
  • dir-645_firmware
  • dir-610
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')