SB2025090424 - Multiple vulnerabilities in D-Link DSL-7740C
Published: September 4, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2025-29514)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the config.xgi function. A remote attacker can bypass implemented security restrictions and download the configuration file.
2) Improper access control (CVE-ID: CVE-2025-29515)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the DELT_file.xgi endpoint. A remote attacker can bypass implemented security restrictions and modify arbitrary settings within the device's XML database, including the administrator’s password.
3) Command Injection (CVE-ID: CVE-2025-29516)
The vulnerability allows a remote user to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the backup function. A remote administrator can pass specially crafted data to the application and execute arbitrary commands.
4) Command Injection (CVE-ID: CVE-2025-29517)
The vulnerability allows a remote user to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the traceroute6 function. A remote administrator can pass specially crafted data to the application and execute arbitrary commands.
5) Command Injection (CVE-ID: CVE-2025-29519)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the EXE parameter. A remote attacker can send a specially crafted GET request and execute arbitrary commands.
6) Use of default credentials (CVE-ID: CVE-2025-29521)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insecure default credentials for the Adminsitrator account. A remote attacker can perform a brute-force attack and gain elevated privileges on the system.
7) Command Injection (CVE-ID: CVE-2025-29522)
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the ping function. A remote attacker can pass specially crafted data to the application and execute arbitrary commands.
8) Command Injection (CVE-ID: CVE-2025-29523)
The vulnerability allows a remote user to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the ping6 function. A remote administrator can pass specially crafted data to the application and execute arbitrary commands.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.