D-Link DCS-825L firmware version 1.08.01 and possibly prior versions contain an insecure implementation in the mydlink-watch-dog.sh script. The script monitors and respawns the `dcp` and `signalc` binaries without validating their integrity, origin, or permissions. An attacker with filesystem access (e.g., via UART or firmware modification) may replace these binaries to achieve persistent arbitrary code execution with root privileges. The issue stems from improper handling of executable trust and absence of integrity checks in the watchdog logic.
Metrics
Affected Vendors & Products
References
History
Sat, 23 Aug 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
D-link
D-link dcs-825l |
|
Vendors & Products |
D-link
D-link dcs-825l |
Fri, 22 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-269 CWE-306 CWE-494 |
|
Metrics |
cvssV3_1
|
Fri, 22 Aug 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | D-Link DCS-825L firmware version 1.08.01 and possibly prior versions contain an insecure implementation in the mydlink-watch-dog.sh script. The script monitors and respawns the `dcp` and `signalc` binaries without validating their integrity, origin, or permissions. An attacker with filesystem access (e.g., via UART or firmware modification) may replace these binaries to achieve persistent arbitrary code execution with root privileges. The issue stems from improper handling of executable trust and absence of integrity checks in the watchdog logic. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-22T18:36:28.102Z
Reserved: 2025-08-13T00:00:00.000Z
Link: CVE-2025-55581

Updated: 2025-08-22T18:35:47.814Z

Status : Awaiting Analysis
Published: 2025-08-22T18:15:35.857
Modified: 2025-08-25T20:24:45.327
Link: CVE-2025-55581

No data.