CVE-2025-58116
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-17

Last updated on: 2025-09-17

Assigner: JPCERT/CC

Description
Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in WN-7D36QR and WN-7D36QR/UE. If this vulnerability is exploited, an arbitrary OS command may be executed by a remote authenticated attacker.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-17
Last Modified
2025-09-17
Generated
2026-05-07
AI Q&A
2025-09-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
i-o_data_device wn-7d36qr/ue *
i-o_data_device wn-7d36qr *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an OS command injection issue in the Wi-Fi router models WN-7D36QR and WN-7D36QR/UE from I-O DATA DEVICE, INC. It allows a remote authenticated attacker to execute arbitrary operating system commands on the device, potentially taking control or causing harm to the system. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an authenticated attacker to run arbitrary OS commands on the affected router, which could lead to full compromise of the device, disruption of network services, unauthorized access to network resources, and potential further attacks on connected systems. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, users should update their WN-7D36QR and WN-7D36QR/UE devices to the latest firmware version 2.1.3 provided by I-O DATA DEVICE, INC. Firmware downloads and update instructions are available from the vendor. Additionally, contacting I-O DATA's help center for support during business hours is recommended. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart