A vulnerability has been found in D-Link DAR-7000 3.2 and classified as critical. This vulnerability affects the function get_ip_addr_details of the file /view/vpn/sxh_vpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument ethname leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
| Link | Resource |
|---|---|
| https://github.com/sjwszt/CVE/blob/main/CVE_1.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.298030 | Permissions Required Third Party Advisory VDB Entry |
| https://vuldb.com/?id.298030 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.502971 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
| https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10354 | Vendor Advisory |
| https://github.com/sjwszt/CVE/blob/main/CVE_1.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-03-01 18:15
Updated : 2025-05-21 16:15
NVD link : CVE-2025-1800
Mitre link : CVE-2025-1800
CVE.ORG link : CVE-2025-1800
JSON object : View
Products Affected
dlink
- dar-7000_firmware
- dar-7000
