A weakness has been identified in D-Link DWR-M920 up to 1.1.50. The affected element is the function sub_4155B4 of the file /boafrm/formLtefotaUpgradeFibocom. This manipulation of the argument fota_url causes command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
References
| Link | Resource |
|---|---|
| https://github.com/panda666-888/vuls/blob/main/d-link/dwr-m920/formLtefotaUpgradeFibocom.md | Exploit Third Party Advisory |
| https://github.com/panda666-888/vuls/blob/main/d-link/dwr-m920/formLtefotaUpgradeFibocom.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.338576 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338576 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.723554 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-29 14:15
Updated : 2025-12-30 20:41
NVD link : CVE-2025-15191
Mitre link : CVE-2025-15191
CVE.ORG link : CVE-2025-15191
JSON object : View
Products Affected
dlink
- dwr-m920
- dwr-m920_firmware
