CVE-2025-9727

A weakness has been identified in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/scanleale/IOT_sec/blob/main/DIR-816L.pdf Exploit Third Party Advisory
https://vuldb.com/?ctiid.322016 Permissions Required VDB Entry
https://vuldb.com/?id.322016 Third Party Advisory VDB Entry
https://vuldb.com/?submit.639698 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-816l_firmware:2.06b01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-816l:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-08-31 12:15

Updated : 2025-10-01 20:42


NVD link : CVE-2025-9727

Mitre link : CVE-2025-9727

CVE.ORG link : CVE-2025-9727


JSON object : View

Products Affected

dlink

  • dir-816l
  • dir-816l_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')