An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetNetworkSettings' functionality of prog.cgi, where the 'IPAddress' and 'SubnetMask' parameters are directly concatenated into shell commands executed via system(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.
References
| Link | Resource |
|---|---|
| http://d-link.com | Product |
| https://github.com/yifan20020708/SGTaint-0-day/blob/main/DLink/DLink-DIR-878/CVE-2025-60676.md | Exploit Third Party Advisory |
| https://www.dlink.com/en | Product |
| https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
17 Nov 2025, 17:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://d-link.com - Product | |
| References | () https://github.com/yifan20020708/SGTaint-0-day/blob/main/DLink/DLink-DIR-878/CVE-2025-60676.md - Exploit, Third Party Advisory | |
| References | () https://www.dlink.com/en - Product | |
| References | () https://www.dlink.com/en/security-bulletin/ - Vendor Advisory | |
| First Time |
Dlink
Dlink dir-878 Dlink dir-878 Firmware |
|
| CPE | cpe:2.3:h:dlink:dir-878:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-878_firmware:1.01b04:*:*:*:*:*:*:* |
14 Nov 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | CWE-77 |
13 Nov 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-13 19:15
Updated : 2025-11-17 17:58
NVD link : CVE-2025-60676
Mitre link : CVE-2025-60676
CVE.ORG link : CVE-2025-60676
JSON object : View
Products Affected
dlink
- dir-878
- dir-878_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
