A vulnerability was found in D-Link DI-7400G+ 19.12.25A1. This affects an unknown function of the file /msp_info.htm?flag=cmd. The manipulation of the argument cmd results in command injection. The attack can be launched remotely. The exploit has been made public and could be used.
References
| Link | Resource |
|---|---|
| https://github.com/xyh4ck/iot_poc/tree/main/D-Link_DI_7400G%2B_Command_Injection | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.338743 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338743 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.726376 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-30 21:15
Updated : 2026-01-09 19:35
NVD link : CVE-2025-15357
Mitre link : CVE-2025-15357
CVE.ORG link : CVE-2025-15357
JSON object : View
Products Affected
dlink
- di-7400g\+
- di-7400g\+_firmware
