D-Link DIR-868L B1 router firmware version FW2.05WWB02 contains an unauthenticated OS command injection vulnerability in the fileaccess.cgi component. The endpoint /dws/api/UploadFile accepts a pre_api_arg parameter that is passed directly to system-level shell execution functions without sanitization or authentication. Remote attackers can exploit this to execute arbitrary commands as root via crafted HTTP requests.
References
| Link | Resource |
|---|---|
| https://cybermaya.in/posts/Post-44/ | Exploit Third Party Advisory |
| https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10397 | Product |
| https://www.dlink.com/en/security-bulletin/ | Not Applicable |
| https://cybermaya.in/posts/Post-44/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-28 15:16
Updated : 2025-09-09 18:41
NVD link : CVE-2025-55583
Mitre link : CVE-2025-55583
CVE.ORG link : CVE-2025-55583
JSON object : View
Products Affected
dlink
- dir-868l
- dir-868l_firmware
