SB2025090424 - Multiple vulnerabilities in D-Link DSL-7740C



SB2025090424 - Multiple vulnerabilities in D-Link DSL-7740C

Published: September 4, 2025

Security Bulletin ID SB2025090424
Severity
High
Patch available
NO
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

High 38% Medium 25% Low 38%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Improper access control (CVE-ID: CVE-2025-29514)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the config.xgi function. A remote attacker can bypass implemented security restrictions and download the configuration file.


2) Improper access control (CVE-ID: CVE-2025-29515)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the DELT_file.xgi endpoint. A remote attacker can bypass implemented security restrictions and modify arbitrary settings within the device's XML database, including the administrator’s password.


3) Command Injection (CVE-ID: CVE-2025-29516)

The vulnerability allows a remote user to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation in the backup function. A remote administrator can pass specially crafted data to the application and execute arbitrary commands.


4) Command Injection (CVE-ID: CVE-2025-29517)

The vulnerability allows a remote user to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation in the traceroute6 function. A remote administrator can pass specially crafted data to the application and execute arbitrary commands.


5) Command Injection (CVE-ID: CVE-2025-29519)

The vulnerability allows a remote attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation in the EXE parameter. A remote attacker can send a specially crafted GET request and execute arbitrary commands.


6) Use of default credentials (CVE-ID: CVE-2025-29521)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insecure default credentials for the Adminsitrator account. A remote attacker can perform a brute-force attack and gain elevated privileges on the system.


7) Command Injection (CVE-ID: CVE-2025-29522)

The vulnerability allows a remote attacker to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation in the ping function. A remote attacker can pass specially crafted data to the application and execute arbitrary commands.


8) Command Injection (CVE-ID: CVE-2025-29523)

The vulnerability allows a remote user to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation in the ping6 function. A remote administrator can pass specially crafted data to the application and execute arbitrary commands.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.