CVE-2025-15357

A vulnerability was found in D-Link DI-7400G+ 19.12.25A1. This affects an unknown function of the file /msp_info.htm?flag=cmd. The manipulation of the argument cmd results in command injection. The attack can be launched remotely. The exploit has been made public and could be used.
References
Link Resource
https://github.com/xyh4ck/iot_poc/tree/main/D-Link_DI_7400G%2B_Command_Injection Exploit Third Party Advisory
https://vuldb.com/?ctiid.338743 Permissions Required VDB Entry
https://vuldb.com/?id.338743 Third Party Advisory VDB Entry
https://vuldb.com/?submit.726376 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:di-7400g\+_firmware:19.12.25a1:*:*:*:*:*:*:*
cpe:2.3:h:dlink:di-7400g\+:a1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-30 21:15

Updated : 2026-01-09 19:35


NVD link : CVE-2025-15357

Mitre link : CVE-2025-15357

CVE.ORG link : CVE-2025-15357


JSON object : View

Products Affected

dlink

  • di-7400g\+
  • di-7400g\+_firmware
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')