ID

VAR-202508-2361


CVE

CVE-2025-29522


TITLE

D-Link Corporation  of  DSL-7740C  Command injection vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-012815

DESCRIPTION

D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the ping function. The D-Link DSL-7740C is a modem manufactured by D-Link, a Chinese company. This vulnerability stems from the ping function's failure to properly sanitize special characters and commands during command construction. An attacker could exploit this vulnerability to execute arbitrary commands

Trust: 2.16

sources: NVD: CVE-2025-29522 // JVNDB: JVNDB-2025-012815 // CNVD: CNVD-2025-19876

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-19876

AFFECTED PRODUCTS

vendor:d linkmodel:dsl-7740cscope:eqversion: -

Trust: 0.8

vendor:d linkmodel:dsl-7740cscope:eqversion:dsl-7740c firmware 6.tr069.20211230

Trust: 0.8

vendor:d linkmodel:dsl-7740cscope: - version: -

Trust: 0.8

vendor:d linkmodel:dsl-7740c dsl7740c.v6.tr069.20211230scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-19876 // JVNDB: JVNDB-2025-012815

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-29522
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-012815
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-19876
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2025-19876
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-29522
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.5
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-012815
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-19876 // JVNDB: JVNDB-2025-012815 // NVD: CVE-2025-29522

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-012815 // NVD: CVE-2025-29522

EXTERNAL IDS

db:NVDid:CVE-2025-29522

Trust: 3.2

db:JVNDBid:JVNDB-2025-012815

Trust: 0.8

db:CNVDid:CNVD-2025-19876

Trust: 0.6

sources: CNVD: CNVD-2025-19876 // JVNDB: JVNDB-2025-012815 // NVD: CVE-2025-29522

REFERENCES

url:https://gist.github.com/stevenyu113228/f44abd7f660a73b0c7f23b7b215d2e05

Trust: 1.8

url:https://www.dlink.com/en/security-bulletin/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-29522

Trust: 1.4

sources: CNVD: CNVD-2025-19876 // JVNDB: JVNDB-2025-012815 // NVD: CVE-2025-29522

SOURCES

db:CNVDid:CNVD-2025-19876
db:JVNDBid:JVNDB-2025-012815
db:NVDid:CVE-2025-29522

LAST UPDATE DATE

2025-09-03T23:00:19.818000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-19876date:2025-08-29T00:00:00
db:JVNDBid:JVNDB-2025-012815date:2025-09-03T07:23:00
db:NVDid:CVE-2025-29522date:2025-08-26T16:15:34.933

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-19876date:2025-08-29T00:00:00
db:JVNDBid:JVNDB-2025-012815date:2025-09-03T00:00:00
db:NVDid:CVE-2025-29522date:2025-08-25T15:15:38.417