ID

VAR-202502-1661


CVE

CVE-2025-1392


TITLE

D-Link DIR-816 Code Injection Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-04183

DESCRIPTION

A vulnerability has been found in D-Link DIR-816 1.01TO and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/webproc?getpage=html/index.html&var:menu=24gwlan&var:page=24G_basic. The manipulation of the argument SSID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link DIR-816 is a wireless router from D-Link of China. D-Link DIR-816 version 1.01TO has a code injection vulnerability. The vulnerability is caused by the incorrect operation of the parameter SSID, which will lead to a cross-site scripting attack. Attackers can use this vulnerability to execute malicious scripts, steal user cookies, or conduct phishing attacks

Trust: 1.44

sources: NVD: CVE-2025-1392 // CNVD: CNVD-2025-04183

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-04183

AFFECTED PRODUCTS

vendor:d linkmodel:dir-816 1.01toscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-04183

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-1392
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2025-04183
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2025-1392
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-04183
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-1392
baseSeverity: LOW
baseScore: 3.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.1
impactScore: 1.4
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-04183 // NVD: CVE-2025-1392

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.0

problemtype:CWE-94

Trust: 1.0

sources: NVD: CVE-2025-1392

EXTERNAL IDS

db:VULDBid:296023

Trust: 1.6

db:NVDid:CVE-2025-1392

Trust: 1.6

db:CNVDid:CNVD-2025-04183

Trust: 0.6

sources: CNVD: CNVD-2025-04183 // NVD: CVE-2025-1392

REFERENCES

url:https://vuldb.com/?id.296023

Trust: 1.6

url:https://vuldb.com/?ctiid.296023

Trust: 1.6

url:https://vuldb.com/?submit.501351

Trust: 1.6

url:https://www.dlink.com/

Trust: 1.6

sources: CNVD: CNVD-2025-04183 // NVD: CVE-2025-1392

SOURCES

db:CNVDid:CNVD-2025-04183
db:NVDid:CVE-2025-1392

LAST UPDATE DATE

2025-03-05T23:05:14.261000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-04183date:2025-03-04T00:00:00
db:NVDid:CVE-2025-1392date:2025-02-17T16:15:16.120

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-04183date:2025-02-27T00:00:00
db:NVDid:CVE-2025-1392date:2025-02-17T16:15:16.120