CVE-2025-1800

A vulnerability has been found in D-Link DAR-7000 3.2 and classified as critical. This vulnerability affects the function get_ip_addr_details of the file /view/vpn/sxh_vpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument ethname leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/sjwszt/CVE/blob/main/CVE_1.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.298030 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.298030 Third Party Advisory VDB Entry
https://vuldb.com/?submit.502971 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10354 Vendor Advisory
https://github.com/sjwszt/CVE/blob/main/CVE_1.md Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dar-7000_firmware:3.2:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dar-7000:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-03-01 18:15

Updated : 2025-05-21 16:15


NVD link : CVE-2025-1800

Mitre link : CVE-2025-1800

CVE.ORG link : CVE-2025-1800


JSON object : View

Products Affected

dlink

  • dar-7000_firmware
  • dar-7000
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')