An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDMZSettings' functionality, where the 'IPAddress' parameter in prog.cgi is stored in NVRAM and later used by librcm.so to construct iptables commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.
References
| Link | Resource |
|---|---|
| http://d-link.com | Product |
| https://github.com/yifan20020708/SGTaint-0-day/blob/main/DLink/DLink-DIR-878/CVE-2025-60673.md | Exploit Third Party Advisory |
| https://www.dlink.com/en | Product |
| https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
17 Nov 2025, 19:03
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:dlink:dir-878:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-878_firmware:1.01b04:*:*:*:*:*:*:* |
|
| First Time |
Dlink
Dlink dir-878 Dlink dir-878 Firmware |
|
| References | () http://d-link.com - Product | |
| References | () https://github.com/yifan20020708/SGTaint-0-day/blob/main/DLink/DLink-DIR-878/CVE-2025-60673.md - Exploit, Third Party Advisory | |
| References | () https://www.dlink.com/en - Product | |
| References | () https://www.dlink.com/en/security-bulletin/ - Vendor Advisory |
14 Nov 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | CWE-77 |
13 Nov 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-13 19:15
Updated : 2025-11-17 19:03
NVD link : CVE-2025-60673
Mitre link : CVE-2025-60673
CVE.ORG link : CVE-2025-60673
JSON object : View
Products Affected
dlink
- dir-878
- dir-878_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
