ID

VAR-202506-0240


CVE

CVE-2025-5620


TITLE

D-Link Systems, Inc.  of  DIR-816  in the firmware  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2025-006465

DESCRIPTION

A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DIR-816 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-816 is a wireless router from D-Link of China. D-Link DIR-816 has a command injection vulnerability, which is caused by the failure of the localIP/remoteIP parameter in the file /goform/setipsec_config to properly filter special characters and commands in the constructed command. No detailed vulnerability details are currently provided

Trust: 2.16

sources: NVD: CVE-2025-5620 // JVNDB: JVNDB-2025-006465 // CNVD: CNVD-2025-12292

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-12292

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-816scope:eqversion:1.10cnb05

Trust: 1.0

vendor:d linkmodel:dir-816scope: - version: -

Trust: 0.8

vendor:d linkmodel:dir-816scope:eqversion:dir-816 firmware 1.10cnb05

Trust: 0.8

vendor:d linkmodel:dir-816scope:eqversion: -

Trust: 0.8

vendor:d linkmodel:dir-816 1.10cnb05scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-12292 // JVNDB: JVNDB-2025-006465 // NVD: CVE-2025-5620

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-5620
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2025-5620
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2025-006465
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-12292
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-5620
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-006465
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-12292
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-5620
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-5620
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-006465
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-12292 // JVNDB: JVNDB-2025-006465 // NVD: CVE-2025-5620 // NVD: CVE-2025-5620

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:CWE-78

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-006465 // NVD: CVE-2025-5620

EXTERNAL IDS

db:NVDid:CVE-2025-5620

Trust: 3.2

db:VULDBid:311106

Trust: 1.8

db:JVNDBid:JVNDB-2025-006465

Trust: 0.8

db:CNVDid:CNVD-2025-12292

Trust: 0.6

sources: CNVD: CNVD-2025-12292 // JVNDB: JVNDB-2025-006465 // NVD: CVE-2025-5620

REFERENCES

url:https://github.com/wudipjq/my_vuln/blob/main/d-link5/vuln_48/48.md

Trust: 1.8

url:https://vuldb.com/?id.311106

Trust: 1.8

url:https://vuldb.com/?submit.589220

Trust: 1.8

url:https://www.dlink.com/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-5620

Trust: 1.4

url:https://vuldb.com/?ctiid.311106

Trust: 1.0

sources: CNVD: CNVD-2025-12292 // JVNDB: JVNDB-2025-006465 // NVD: CVE-2025-5620

SOURCES

db:CNVDid:CNVD-2025-12292
db:JVNDBid:JVNDB-2025-006465
db:NVDid:CVE-2025-5620

LAST UPDATE DATE

2025-06-15T23:46:35.401000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-12292date:2025-06-12T00:00:00
db:JVNDBid:JVNDB-2025-006465date:2025-06-09T02:57:00
db:NVDid:CVE-2025-5620date:2025-06-06T15:42:43.250

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-12292date:2025-06-12T00:00:00
db:JVNDBid:JVNDB-2025-006465date:2025-06-09T00:00:00
db:NVDid:CVE-2025-5620date:2025-06-05T00:15:23.513