A vulnerability classified as critical has been found in D-Link DIR-600L up to 2.07B01. This affects the function formSysCmd. The manipulation of the argument host leads to command injection. It is possible to initiate the attack remotely. This vulnerability only affects products that are no longer supported by the maintainer.
History

Mon, 12 May 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-600l
Dlink dir-600l Firmware
CPEs cpe:2.3:h:dlink:dir-600l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-600l
Dlink dir-600l Firmware

Tue, 06 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 06 May 2025 11:45:00 +0000

Type Values Removed Values Added
Description A vulnerability classified as critical has been found in D-Link DIR-600L up to 2.07B01. This affects the function formSysCmd. The manipulation of the argument host leads to command injection. It is possible to initiate the attack remotely. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-600L formSysCmd command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-05-06T13:29:54.757Z

Reserved: 2025-05-05T16:58:51.336Z

Link: CVE-2025-4349

cve-icon Vulnrichment

Updated: 2025-05-06T13:29:49.634Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-06T12:15:30.140

Modified: 2025-05-12T17:30:08.577

Link: CVE-2025-4349

cve-icon Redhat

No data.