CVE-2018-25115
BaseFortify
Publication date: 2025-08-27
Last updated on: 2025-09-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dlink | dir-110_firmware | * |
| dlink | dir-110 | * |
| dlink | dir-412_firmware | * |
| dlink | dir-412 | * |
| dlink | dir-600_firmware | * |
| dlink | dir-600 | * |
| dlink | dir-610_firmware | * |
| dlink | dir-610 | * |
| dlink | dir-615_firmware | * |
| dlink | dir-615 | * |
| dlink | dir-645_firmware | * |
| dlink | dir-645 | * |
| dlink | dir-815_firmware | 1.03 |
| dlink | dir-815 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects multiple D-Link DIR-series routers running firmware version 1.03. It exists in the service.cgi endpoint, specifically in the EVENT=CHECKFW parameter, which is improperly handled and passed directly to the system shell without sanitization. This allows remote attackers to send crafted HTTP POST requests that inject and execute arbitrary system commands with root privileges, leading to full device compromise without requiring authentication.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can gain full control over the affected router with root privileges. This can lead to unauthorized access, manipulation of network traffic, interception of sensitive data, disruption of network services, and potentially using the compromised device as a foothold for further attacks within the network.