CVE-2025-13562

A vulnerability was identified in D-Link DIR-852 1.00. This issue affects some unknown processing of the file /gena.cgi. Such manipulation of the argument service leads to command injection. The attack can be executed remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/YZS17/CVE/blob/main/DLink/DLink-DIR852/RCE2.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.333327 Permissions Required VDB Entry
https://vuldb.com/?id.333327 Third Party Advisory VDB Entry
https://vuldb.com/?submit.697063 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-852_firmware:1.00:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-852:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-11-23 18:15

Updated : 2025-11-26 17:28


NVD link : CVE-2025-13562

Mitre link : CVE-2025-13562

CVE.ORG link : CVE-2025-13562


JSON object : View

Products Affected

dlink

  • dir-852_firmware
  • dir-852
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')