Home

Description

EN DE

A weakness has been identified in D-Link DIR-852 up to 20251002. This affects an unknown part of the file /HNAP1/. Executing manipulation can lead to command injection. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.

Es wurde eine Schwachstelle in D-Link DIR-852 up to 20251002 entdeckt. Davon betroffen ist unbekannter Code der Datei /HNAP1/. Mittels dem Manipulieren mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-10-08 | Published 2025-10-08 | Updated 2025-10-08 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
HIGH: 7.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
HIGH: 7.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
7.5AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Command Injection

Injection

Product status

20251002
affected

Timeline

2025-10-08:Advisory disclosed
2025-10-08:VulDB entry created
2025-10-08:VulDB entry last update

Credits

sheratan (VulDB User) reporter

References

vuldb.com/?id.327605 (VDB-327605 | D-Link DIR-852 HNAP1 command injection) vdb-entry

vuldb.com/?ctiid.327605 (VDB-327605 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.667505 (Submit #667505 | D-Link DIR-852 A1 Command Injection) third-party-advisory

www.yuque.com/jh0ng/vmpda6/cqi681wr7vci6kx9 exploit

www.dlink.com/ product

cve.org (CVE-2025-11488)

nvd.nist.gov (CVE-2025-11488)

Download JSON