CVE-2025-7836
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-19

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability has been found in D-Link DIR-816L up to 2.06B01 and classified as critical. Affected by this vulnerability is the function lxmldbc_system of the file /htdocs/cgibin of the component Environment Variable Handler. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-19
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-07-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
dlink dir-816l_firmware to 2.06b01 (exc)
dlink dir-816l *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-7836 is a critical remote command injection vulnerability in the D-Link DIR-816L router firmware up to version 2.06B01. It occurs in the function lxmldbc_system within the /htdocs/cgibin directory, part of the Environment Variable Handler. The vulnerability arises because the program retrieves environment variable parameters but only filters out backtick (`) characters, leaving other command symbols unfiltered. Attackers can exploit this by crafting malicious input that is passed to system calls, allowing them to execute arbitrary commands remotely on the device. [1, 2]


How can this vulnerability impact me? :

This vulnerability allows remote attackers to execute arbitrary system commands on the affected D-Link DIR-816L router without authentication. This can compromise the confidentiality, integrity, and availability of the device and the network it is connected to. Since the router is no longer supported by the vendor and no mitigations are available, exploitation can lead to full device compromise, potentially allowing attackers to control network traffic, steal data, or disrupt services. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can involve monitoring for unusual or suspicious commands targeting the lxmldbc_system function or attempts to inject commands via environment variables, especially those containing special characters other than backticks. Since the vulnerability involves remote command injection via crafted input strings like "ssdp:all+command", network monitoring tools can be used to detect such patterns. However, no specific detection commands are provided in the resources. Reviewing logs for unexpected system command executions or scanning for devices running vulnerable firmware versions (D-Link DIR-816L up to 2.06B01) can help identify affected systems. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include replacing the affected D-Link DIR-816L router with an alternative product, as the device is no longer supported and no known mitigations or patches are available. Since the vulnerability allows remote command injection without authentication and exploitation is easy, discontinuing use of the vulnerable firmware and device is recommended to prevent exploitation. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart