CVE-2025-13562
Published: 23 November 2025
Description
A vulnerability was identified in D-Link DIR-852 1.00. This issue affects some unknown processing of the file /gena.cgi. Such manipulation of the argument service leads to command injection. The attack can be executed remotely. The exploit is publicly available and…
more
might be used. This vulnerability only affects products that are no longer supported by the maintainer.
Mitigating Controls (NIST 800-53 r5)AI
Directly validates and sanitizes the 'service' argument in /gena.cgi processing to block command injection exploits.
Mandates timely identification, reporting, and remediation of flaws like the command injection vulnerability, including compensatory mitigations since no patches are available.
Prohibits use of unsupported system components such as the end-of-life D-Link DIR-852 firmware v1.00, preventing exposure to unpatchable command injection.
Security SummaryAI
CVE-2025-13562 is a command injection vulnerability affecting the D-Link DIR-852 router on firmware version 1.00. The flaw occurs in the processing of the /gena.cgi file, where manipulation of the "service" argument enables arbitrary command injection. It is classified under CWE-74 and CWE-77, with a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
Remote, unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows limited impacts on confidentiality, integrity, and availability, such as executing injected commands on the device.
The vulnerability affects products no longer supported by the maintainer, so no patches are available. Advisories on VulDB detail the issue and submission history, while a public exploit is available on GitHub, increasing the risk of active use. The D-Link website offers general product information but no specific mitigation guidance.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in public-facing /gena.cgi enables remote unauthenticated exploitation (T1190: Exploit Public-Facing Application) leading to arbitrary command execution (T1202: Indirect Command Execution, as cited in advisory).