Cyber Posture

CVE-2025-25743

HighPublic PoC

Published: 12 February 2025

Published
12 February 2025
Modified
05 March 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0416 88.7th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-25743 is a command injection vulnerability (CWE-77) affecting the D-Link DIR-853 router running firmware version A1 FW1.20B07. The flaw resides in the SetVirtualServerSettings module, where insufficient input validation allows arbitrary command execution. Published on 2025-02-12, it carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.

Exploitation requires high privileges (PR:H), such as authenticated administrative access, and can be performed over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). A successful attack enables an attacker to execute arbitrary commands on the underlying operating system, potentially leading to high confidentiality, integrity, and availability impacts (C:H/I:H/A:H) within the unchanged scope (S:U), such as full device compromise, data exfiltration, or persistent backdoor installation.

The primary advisory reference is available at https://dear-sunshine-ba5.notion.site/D-Link-DIR-853-1812386a664480229910c137ded2d3f1, which details the vulnerability discovery but does not specify patches or mitigations in the provided information. Security practitioners should check for firmware updates from D-Link and restrict administrative access to trusted networks.

Details

CWE(s)
CWE-77

Affected Products

dlink
dir-853 firmware
1.20b07

MITRE ATT&CK Enterprise Techniques

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection vulnerability enables arbitrary OS command execution on the Linux-based router firmware after admin authentication, directly mapping to Unix Shell.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References