CVE-2025-15391
Published: 31 December 2025
Description
A weakness has been identified in D-Link DIR-806A 100CNb11. Affected is the function ssdpcgi_main of the component SSDP Request Handler. This manipulation causes command injection. The attack can be initiated remotely. The exploit has been made available to the public…
more
and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
Mitigating Controls (NIST 800-53 r5)AI
Prohibits the use of unsupported system components like the end-of-life D-Link DIR-806A firmware, preventing exploitation of unpatched command injection vulnerabilities.
Requires validation of SSDP request inputs to the ssdpcgi_main function, directly preventing command injection attacks.
Enforces boundary protection to monitor and control inbound network traffic, blocking remote malicious SSDP requests targeting the vulnerable handler.
Security SummaryAI
CVE-2025-15391 is a command injection vulnerability (CWE-74, CWE-77) in the ssdpcgi_main function of the SSDP Request Handler component within D-Link DIR-806A firmware version 100CNb11. This flaw affects only products that are no longer supported by the maintainer, with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
The vulnerability enables remote exploitation over the network by attackers with low privileges. Manipulation of SSDP requests triggers command injection, potentially allowing limited impacts on confidentiality, integrity, and availability. A public exploit is available, facilitating potential real-world attacks on vulnerable devices.
Advisories from VulDB and a GitHub repository detail the issue and provide exploit code, confirming remote command injection without mentioning patches due to the product's end-of-support status. The D-Link website is referenced but offers no specific mitigation for this unsupported firmware.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in public-facing SSDP Request Handler on router firmware enables exploitation of public-facing application (T1190) and remote Unix shell command execution (T1059.004).