A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device.
References
| Link | Resource |
|---|---|
| http://d-link.com | Product |
| https://github.com/yifan20020708/SGTaint-0-day/blob/main/DLink/DLink-DIR-823G/CVE-2025-60675.md | Exploit Third Party Advisory |
| https://www.dlink.com/en | Product |
| https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
17 Nov 2025, 19:04
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://d-link.com - Product | |
| References | () https://github.com/yifan20020708/SGTaint-0-day/blob/main/DLink/DLink-DIR-823G/CVE-2025-60675.md - Exploit, Third Party Advisory | |
| References | () https://www.dlink.com/en - Product | |
| References | () https://www.dlink.com/en/security-bulletin/ - Vendor Advisory | |
| First Time |
Dlink dir-823g Firmware
Dlink Dlink dir-823g |
|
| CPE | cpe:2.3:o:dlink:dir-823g_firmware:1.0.2b05_20181207:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-823g:-:*:*:*:*:*:*:* |
14 Nov 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
14 Nov 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-77 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
13 Nov 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-13 19:15
Updated : 2025-11-17 19:04
NVD link : CVE-2025-60675
Mitre link : CVE-2025-60675
CVE.ORG link : CVE-2025-60675
JSON object : View
Products Affected
dlink
- dir-823g
- dir-823g_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
