ID

VAR-202508-2617


CVE

CVE-2025-9727


TITLE

D-Link Corporation  of  DIR-816L  Command injection vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-015400

DESCRIPTION

A weakness has been identified in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Corporation of DIR-816L The firmware contains a command injection vulnerability. (DoS) It may be in a state. The D-Link DIR-816L is a dual-band wireless router that supports 2.4GHz and 5GHz bands, with a maximum transmission rate of 450Mbps. This vulnerability stems from the fact that the `service` parameter in the file `/soap.cgi` fails to properly filter special characters and commands used in command construction. Detailed vulnerability information is not currently available

Trust: 2.16

sources: NVD: CVE-2025-9727 // JVNDB: JVNDB-2025-015400 // CNVD: CNVD-2025-25752

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-25752

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-816lscope:eqversion:2.06b01

Trust: 1.0

vendor:d linkmodel:dir-816lscope:eqversion: -

Trust: 0.8

vendor:d linkmodel:dir-816lscope:eqversion:dir-816l firmware 2.06b01

Trust: 0.8

vendor:d linkmodel:dir-816lscope: - version: -

Trust: 0.8

vendor:d linkmodel:dir-816l 206b01scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-25752 // JVNDB: JVNDB-2025-015400 // NVD: CVE-2025-9727

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-9727
value: LOW

Trust: 1.0

nvd@nist.gov: CVE-2025-9727
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2025-015400
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-25752
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2025-9727
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-015400
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-25752
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-9727
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-9727
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-015400
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-25752 // JVNDB: JVNDB-2025-015400 // NVD: CVE-2025-9727 // NVD: CVE-2025-9727

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-015400 // NVD: CVE-2025-9727

EXTERNAL IDS

db:NVDid:CVE-2025-9727

Trust: 3.2

db:VULDBid:322016

Trust: 1.8

db:JVNDBid:JVNDB-2025-015400

Trust: 0.8

db:CNVDid:CNVD-2025-25752

Trust: 0.6

sources: CNVD: CNVD-2025-25752 // JVNDB: JVNDB-2025-015400 // NVD: CVE-2025-9727

REFERENCES

url:https://github.com/scanleale/iot_sec/blob/main/dir-816l.pdf

Trust: 1.8

url:https://vuldb.com/?id.322016

Trust: 1.8

url:https://vuldb.com/?submit.639698

Trust: 1.8

url:https://www.dlink.com/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-9727

Trust: 1.4

url:https://vuldb.com/?ctiid.322016

Trust: 1.0

sources: CNVD: CNVD-2025-25752 // JVNDB: JVNDB-2025-015400 // NVD: CVE-2025-9727

SOURCES

db:CNVDid:CNVD-2025-25752
db:JVNDBid:JVNDB-2025-015400
db:NVDid:CVE-2025-9727

LAST UPDATE DATE

2025-11-19T23:20:09.297000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-25752date:2025-10-30T00:00:00
db:JVNDBid:JVNDB-2025-015400date:2025-10-08T05:56:00
db:NVDid:CVE-2025-9727date:2025-10-01T20:42:08.643

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-25752date:2025-10-30T00:00:00
db:JVNDBid:JVNDB-2025-015400date:2025-10-08T00:00:00
db:NVDid:CVE-2025-9727date:2025-08-31T12:15:32.823