The DI-7400G+ router has a command injection vulnerability, which allows attackers to execute arbitrary commands on the device. The sub_478D28 function in in mng_platform.asp, and sub_4A12DC function in wayos_ac_server.asp of the jhttpd program, with the parameter ac_mng_srv_host.
References
| Link | Resource |
|---|---|
| http://di-7400.com | Broken Link |
| https://github.com/xyh4ck/iot_poc | Exploit Third Party Advisory |
| https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DI-7400G%2B | Product |
| https://www.dlink.com/en/security-bulletin/ | Not Applicable |
| https://github.com/xyh4ck/iot_poc | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-22 17:15
Updated : 2025-10-02 13:07
NVD link : CVE-2025-57105
Mitre link : CVE-2025-57105
CVE.ORG link : CVE-2025-57105
JSON object : View
Products Affected
dlink
- di-7400g\+
- di-7400g\+_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
