Home

Description

EN DE

A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01. Affected is the function wake_on_lan. The manipulation of the argument mac leads to command injection. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.

Es wurde eine kritische Schwachstelle in D-Link DIR-605L 2.13B01 entdeckt. Es geht dabei um die Funktion wake_on_lan. Durch Manipulieren des Arguments mac mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren.

PUBLISHED Reserved 2025-05-08 | Published 2025-05-09 | Updated 2025-05-09 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P

Problem types

Command Injection

Injection

Product status

2.13B01
affected

Timeline

2025-05-08:Advisory disclosed
2025-05-08:VulDB entry created
2025-05-08:VulDB entry last update

Credits

jylsec (VulDB User) reporter

References

vuldb.com/?id.308052 (VDB-308052 | D-Link DIR-605L wake_on_lan command injection) vdb-entry technical-description

vuldb.com/?ctiid.308052 (VDB-308052 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.558356 (Submit #558356 | D-Link DIR-605L 2.13B01 Command Injection) third-party-advisory

github.com/...5l/Command_injection-wake_on_lan-mac/README.md related

www.dlink.com/ broken-link product

cve.org (CVE-2025-4445)

nvd.nist.gov (CVE-2025-4445)

Download JSON