#VU114398 Command Injection in DIR-818L - CVE-2025-8956
Published: August 25, 2025
Vulnerability identifier: #VU114398
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2025-8956
CWE-ID: CWE-77
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
DIR-818L
DIR-818L
Software vendor:
D-Link
D-Link
Description
The vulnerability allows a remote attacker to execute arbitrary commands on the system.
The vulnerability exists due to insufficient input validation in the getenv function of the /htdocs/cgibin file in the ssdpcgi component. A remote user can pass specially crafted data to the application and execute arbitrary commands.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
External links
- https://github.com/LonTan0/CVE/blob/main/Remote%20Arbitrary%20Command%20Execution%20Vulnerability%20in%20ssdpcgi%20of%20D-Link%20DIR%E2%80%91818L.md
- https://vuldb.com/?ctiid.319925
- https://vuldb.com/?id.319925
- https://vuldb.com/?submit.627835
- https://www.dlink.com/
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10453