CVE-2018-25120
Severity CVSS v4.0:
CRITICAL
Type:
CWE-78
OS Command Injections
Publication date:
29/10/2025
Last modified:
28/11/2025
Description
D-Link DNS-343 ShareCenter devices running firmware versions up to and including 1.05 contain a command injection vulnerability in the Mail Test functionality. The web maintenance script posts to the internal goForm endpoint '/goform/Mail_Test' and uses several form parameters directly in a call to a system email utility without proper input validation. An unauthenticated remote attacker can supply crafted form data that injects shell commands, resulting in execution as root on the device. NOTE: The DNS-343 product line has been declared end-of-life.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:dlink:dns-343_firmware:*:*:*:*:*:*:*:* | 1.0.5 (including) | |
| cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/jamesbercegay/advisories/blob/master/%5BGTSA-00128%5D%20D-Link%20DNS-343%20ShareCenter%201.05%20Remote%20Root.txt
- https://qkl.seebug.org/vuldb/ssvid-97088
- https://www.dlink.com/al/sq/products/dns-343-sharecenter-4-bay-network-storage-enclosure
- https://www.exploit-db.com/exploits/43845
- https://www.vulncheck.com/advisories/dlink-dns343-sharecenter-command-injection-via-goform-mail-test



