Cyber Posture

CVE-2024-57595

Critical

Published: 27 January 2025

Published
27 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0237 85.0th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

DLINK DIR-825 REVB 2.03 devices have an OS command injection vulnerability in the CGl interface apc_client_pin.cgi, which allows remote attackers to execute arbitrary commands via the parameter "wps_pin" passed to the apc_client_pin.cgi binary through a POST request.

Security Summary

CVE-2024-57595 is an OS command injection vulnerability (CWE-78) affecting D-Link DIR-825 REVB devices running firmware version 2.03. The flaw resides in the CGI interface script apc_client_pin.cgi, where the "wps_pin" parameter in POST requests to the binary is vulnerable to injection. This allows attackers to execute arbitrary operating system commands. The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility without authentication or user interaction.

Remote, unauthenticated attackers can exploit this vulnerability by crafting a malicious POST request to the apc_client_pin.cgi endpoint with a command injected into the wps_pin parameter. Successful exploitation grants full arbitrary command execution on the device, potentially leading to complete compromise, including data theft, persistence, or use as a pivot in further network attacks.

Advisories and additional details are available via the D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ and a GitHub repository documenting the issue at https://github.com/IdaJea/IOT_vuln_1/blob/master/DIR825/wps_pin.md, which may include mitigation guidance or patch information.

Details

CWE(s)
CWE-78

References