#VU112891 Command Injection in DIR-645 - CVE-2025-7192
Published: July 15, 2025
Vulnerability identifier: #VU112891
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2025-7192
CWE-ID: CWE-77
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
DIR-645
DIR-645
Software vendor:
D-Link
D-Link
Description
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the ssdpcgi_main function. A remote user can pass specially crafted data to the application and execute arbitrary commands.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
External links
- https://github.com/Thir0th/Thir0th-CVE/blob/main/D-Link%20DIR%E2%80%91645%20A1%20has%20a%20remote%20arbitrary%20command%20execution%20vulnerability%20in%20ssdpcgi.md
- https://vuldb.com/?ctiid.315131
- https://vuldb.com/?id.315131
- https://vuldb.com/?submit.607261
- https://www.dlink.com/
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10384