A security vulnerability has been detected in D-Link DWR-M920 up to 1.1.50. The impacted element is the function sub_415328 of the file /boafrm/formLtefotaUpgradeQuectel. Such manipulation of the argument fota_url leads to command injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/panda666-888/vuls/blob/main/d-link/dwr-m920/formLtefotaUpgradeQuectel.md | Exploit Third Party Advisory |
| https://github.com/panda666-888/vuls/blob/main/d-link/dwr-m920/formLtefotaUpgradeQuectel.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.338577 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338577 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.723555 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-29 15:16
Updated : 2025-12-30 20:41
NVD link : CVE-2025-15192
Mitre link : CVE-2025-15192
CVE.ORG link : CVE-2025-15192
JSON object : View
Products Affected
dlink
- dwr-m920
- dwr-m920_firmware
