A vulnerability classified as critical was found in D-Link DIR-600L up to 2.07B01. This vulnerability affects the function wake_on_lan. The manipulation of the argument host leads to command injection. The attack can be initiated remotely. This vulnerability only affects products that are no longer supported by the maintainer.
History

Mon, 12 May 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-600l
Dlink dir-600l Firmware
CPEs cpe:2.3:h:dlink:dir-600l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-600l
Dlink dir-600l Firmware

Tue, 06 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 06 May 2025 11:45:00 +0000

Type Values Removed Values Added
Description A vulnerability classified as critical was found in D-Link DIR-600L up to 2.07B01. This vulnerability affects the function wake_on_lan. The manipulation of the argument host leads to command injection. The attack can be initiated remotely. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-600L wake_on_lan command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-05-06T13:28:48.495Z

Reserved: 2025-05-05T16:58:54.023Z

Link: CVE-2025-4350

cve-icon Vulnrichment

Updated: 2025-05-06T13:28:42.882Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-06T12:15:30.343

Modified: 2025-05-12T17:30:15.047

Link: CVE-2025-4350

cve-icon Redhat

No data.