D-Link Router DIR-868L A1 FW106KRb01.bin has an unauthenticated remote code execution vulnerability in the cgibin binary. The HNAP service provided by cgibin does not filter the HTTP SOAPAction header field. The unauthenticated remote attacker can execute the shell command.
References
| Link | Resource |
|---|---|
| https://github.com/WhereisRain/DIR-868 | Exploit Third Party Advisory |
| https://github.com/WhereisRain/DIR-868/tree/main | Exploit Third Party Advisory |
| https://www.dlink.com/en/security-bulletin/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-19 20:15
Updated : 2025-12-11 18:23
NVD link : CVE-2025-63932
Mitre link : CVE-2025-63932
CVE.ORG link : CVE-2025-63932
JSON object : View
Products Affected
dlink
- dir-868l_firmware
- dir-868l
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
