We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as critical was found in D-Link DI-7300G+ 19.12.25A1. Affected by this vulnerability is an unknown functionality of the file httpd_debug.asp. The manipulation of the argument Time leads to os command injection. The exploit has been disclosed to the public and may be used.
In D-Link DI-7300G+ 19.12.25A1 wurde eine kritische Schwachstelle entdeckt. Hierbei betrifft es unbekannten Programmcode der Datei httpd_debug.asp. Durch das Beeinflussen des Arguments Time mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur öffentlichen Verfügung.
2025-06-29: | Advisory disclosed |
2025-06-29: | VulDB entry created |
2025-06-29: | VulDB entry last update |
shiny (VulDB User)
vuldb.com/?id.314389 (VDB-314389 | D-Link DI-7300G+ httpd_debug.asp os command injection)
vuldb.com/?ctiid.314389 (VDB-314389 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.604442 (Submit #604442 | D-Link D-Link DI-7300G+ DI-7300G+ V19.12.25A1 OS Command Injection)
github.com/...mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
www.dlink.com/
Support options