CVE-2025-14659
Published: 14 December 2025
Description
A vulnerability was detected in D-Link DIR-860LB1 and DIR-868LB1 203b01/203b03. Affected is an unknown function of the component DHCP Daemon. The manipulation of the argument Hostname results in command injection. It is possible to launch the attack remotely. The exploit…
more
is now public and may be used.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the command injection flaw in the DHCP daemon by identifying, prioritizing, and applying patches or updates to vulnerable firmware.
Validates untrusted hostname inputs to the DHCP daemon to prevent injection of arbitrary commands.
Enforces least privilege on the DHCP daemon process to limit the impact and privileges of any successfully injected commands.
Security SummaryAI
CVE-2025-14659 is a command injection vulnerability affecting the DHCP Daemon component in D-Link routers DIR-860LB1 firmware version 203b03 and DIR-868LB1 firmware version 203b01. The issue arises from improper handling of the Hostname argument in an unknown function, allowing attackers to inject arbitrary commands. This flaw, associated with CWE-74 and CWE-77, was published on 2025-12-14 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.
The vulnerability can be exploited remotely by an attacker with low privileges (PR:L), such as a user on the local network who can interact with the DHCP service. By manipulating the Hostname argument, the attacker can execute arbitrary commands on the device, potentially achieving remote code execution and full compromise of the router, including data theft, modification of configurations, or disruption of network services.
Advisories detailing the vulnerability, including proof-of-concept exploits, are available in references such as the Notion pages for DIR-860LB1 and DIR-868LB1, along with VulDB entries (ctiid.336391, id.336391, submit.713701). No specific patches or mitigations are detailed in the provided information.
The exploit is public and may be used by attackers, increasing the risk for unpatched devices.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in DHCP daemon enables exploitation of public-facing network service (T1190) and arbitrary Unix shell command execution (T1059.004).