The web interface of multiple D-Link routers, including DIR-600 rev B (≤2.14b01) and DIR-300 rev B (≤2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enabling persistent interactive shell access as root.
2025-08-05T20:15:35.690
2025-09-23T18:37:48.680
Analyzed
CVSSv3.1: 9.8 (CRITICAL)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | dlink | dir-600_firmware | ≤ 2.14b01 | Yes |
| Hardware | dlink | dir-600 | b | No |
| Operating System | dlink | dir-300_firmware | ≤ 2.13 | Yes |
| Hardware | dlink | dir-300 | b | No |