24h | 7d | 30d

Overview

  • Pending

13 Nov 2025
Published
14 Nov 2025
Updated

CVSS
Pending
EPSS
0.28%

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDMZSettings' functionality, where the 'IPAddress' parameter in prog.cgi is stored in NVRAM and later used by librcm.so to construct iptables commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 7 hours ago

Fediverse

Profile picture

D-Link is warning of three vulnerabilities in end-of-life routers

Vulnerabilities:
CVE-2025-60672 - vulnerability in SetDynamicDNSSettings parameters stored in NVRAM and used in system commands
CVE-2025-60673 - vulnerability in SetDMZSettings and unsanitized IPAddress value
CVE-2025-60676 - Unsanitized fields in /tmp/new_qos.rule

Impact: Allows attackers to remote execute code on D-Link DIR-878 router that has been end-of-life since 2021

Remediation: Replace with a supported router

#cybersecurity #DLink #vulnerabilitymanagement

bleepingcomputer.com/news/secu

  • 0
  • 1
  • 0
  • 7h ago

Overview

  • Pending

13 Nov 2025
Published
14 Nov 2025
Updated

CVSS
Pending
EPSS
0.28%

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDynamicDNSSettings' functionality, where the 'ServerAddress' and 'Hostname' parameters in prog.cgi are stored in NVRAM and later used by rc to construct system commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 7 hours ago

Fediverse

Profile picture

D-Link is warning of three vulnerabilities in end-of-life routers

Vulnerabilities:
CVE-2025-60672 - vulnerability in SetDynamicDNSSettings parameters stored in NVRAM and used in system commands
CVE-2025-60673 - vulnerability in SetDMZSettings and unsanitized IPAddress value
CVE-2025-60676 - Unsanitized fields in /tmp/new_qos.rule

Impact: Allows attackers to remote execute code on D-Link DIR-878 router that has been end-of-life since 2021

Remediation: Replace with a supported router

#cybersecurity #DLink #vulnerabilitymanagement

bleepingcomputer.com/news/secu

  • 0
  • 1
  • 0
  • 7h ago

Overview

  • Pending

13 Nov 2025
Published
14 Nov 2025
Updated

CVSS
Pending
EPSS
0.28%

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetNetworkSettings' functionality of prog.cgi, where the 'IPAddress' and 'SubnetMask' parameters are directly concatenated into shell commands executed via system(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 7 hours ago

Fediverse

Profile picture

D-Link is warning of three vulnerabilities in end-of-life routers

Vulnerabilities:
CVE-2025-60672 - vulnerability in SetDynamicDNSSettings parameters stored in NVRAM and used in system commands
CVE-2025-60673 - vulnerability in SetDMZSettings and unsanitized IPAddress value
CVE-2025-60676 - Unsanitized fields in /tmp/new_qos.rule

Impact: Allows attackers to remote execute code on D-Link DIR-878 router that has been end-of-life since 2021

Remediation: Replace with a supported router

#cybersecurity #DLink #vulnerabilitymanagement

bleepingcomputer.com/news/secu

  • 0
  • 1
  • 0
  • 7h ago
Showing 11 to 13 of 13 CVEs