CVE-2025-9769
Severity CVSS v4.0:
LOW
Type:
CWE-74
Injection
Publication date:
01/09/2025
Last modified:
04/09/2025
Description
A security flaw has been discovered in D-Link DI-7400G+ 19.12.25A1. Affected is the function sub_478D28 of the file /mng_platform.asp. The manipulation of the argument addr with the input `echo 12345 > poc.txt` results in command injection. An attack on the physical device is feasible. The exploit has been released to the public and may be exploited.
Impact
Base Score 4.0
2.40
Severity 4.0
LOW
Base Score 3.x
4.10
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:dlink:di-7400g\+_firmware:19.12.25a1:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:di-7400g\+:v2.a1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/xyh4ck/iot_poc
- https://github.com/xyh4ck/iot_poc#vulnerability-verification-process
- https://vuldb.com/?ctiid_322069=
- https://vuldb.com/?id_322069=
- https://vuldb.com/?submit_640779=
- https://www.dlink.com/
- https://github.com/xyh4ck/iot_poc
- https://github.com/xyh4ck/iot_poc#vulnerability-verification-process



