SB2025082527 - Multiple vulnerabilities in D-Link DIR-818L and DIR-818LW
Published: August 25, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Command Injection (CVE-ID: CVE-2025-8956)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the getenv function of the /htdocs/cgibin file in the ssdpcgi component. A remote user can pass specially crafted data to the application and execute arbitrary commands.
2) Cross-site scripting (CVE-ID: CVE-2025-9003)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the /bsc_lan.php file of the DHCP Reserved Address Handler component. A remote user can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://github.com/LonTan0/CVE/blob/main/Remote%20Arbitrary%20Command%20Execution%20Vulnerability%20in%20ssdpcgi%20of%20D-Link%20DIR%E2%80%91818L.md
- https://vuldb.com/?ctiid.319925
- https://vuldb.com/?id.319925
- https://vuldb.com/?submit.627835
- https://www.dlink.com/
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10453
- https://vuldb.com/?ctiid.320032
- https://vuldb.com/?id.320032
- https://vuldb.com/?submit.628334