We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34125

D-Link DSP-W110A1 Cookie Command Injection



Description

An unauthenticated command injection vulnerability exists in the cookie handling process of the lighttpd web server on D-Link DSP-W110A1 firmware version 1.05B01. This occurs when specially crafted cookie values are processed, allowing remote attackers to execute arbitrary commands on the underlying Linux operating system. Successful exploitation enables full system compromise.

Reserved 2025-04-15 | Published 2025-07-16 | Updated 2025-07-16 | Assigner VulnCheck


CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

1.05B01
affected

Credits

Peter Adkins finder

References

web.archive.org/...arnium/secpub/tree/master/D-Link/DSP-W110 third-party-advisory exploit

raw.githubusercontent.com/...k_dspw110_cookie_noauth_exec.rb exploit

www.vulncheck.com/...link-dspw110a1-cookie-command-injection third-party-advisory

www.exploit-db.com/exploits/37628 exploit

cve.org (CVE-2025-34125)

nvd.nist.gov (CVE-2025-34125)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34125

Support options

Helpdesk Chat, Email, Knowledgebase