Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21 UTC.
History

Wed, 24 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-110
Dlink dir-110 Firmware
Dlink dir-412
Dlink dir-412 Firmware
Dlink dir-600
Dlink dir-600 Firmware
Dlink dir-610
Dlink dir-610 Firmware
Dlink dir-615
Dlink dir-615 Firmware
Dlink dir-645
Dlink dir-645 Firmware
Dlink dir-815
Dlink dir-815 Firmware
CPEs cpe:2.3:h:dlink:dir-110:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-412:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-600:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-610:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-645:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-815:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-412_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-610_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-615_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-645_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-815_firmware:1.03:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-110
Dlink dir-110 Firmware
Dlink dir-412
Dlink dir-412 Firmware
Dlink dir-600
Dlink dir-600 Firmware
Dlink dir-610
Dlink dir-610 Firmware
Dlink dir-615
Dlink dir-615 Firmware
Dlink dir-645
Dlink dir-645 Firmware
Dlink dir-815
Dlink dir-815 Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 28 Aug 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-110
D-link dir-412
D-link dir-600
D-link dir-610
D-link dir-615
D-link dir-645
D-link dir-815
Vendors & Products D-link
D-link dir-110
D-link dir-412
D-link dir-600
D-link dir-610
D-link dir-615
D-link dir-645
D-link dir-815

Thu, 28 Aug 2025 20:00:00 +0000

Type Values Removed Values Added
Description Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21. Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21 UTC.

Thu, 28 Aug 2025 19:45:00 +0000

Type Values Removed Values Added
Description Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21.

Thu, 28 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 27 Aug 2025 21:30:00 +0000

Type Values Removed Values Added
Description Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary.
Title D-Link DIR-110/412/600/615/645/815 RCE via service.cgi
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-27T21:24:23.427Z

Updated: 2025-08-28T19:45:56.397Z

Reserved: 2025-08-25T17:39:38.473Z

Link: CVE-2018-25115

cve-icon Vulnrichment

Updated: 2025-08-28T13:55:12.281Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-27T22:15:31.370

Modified: 2025-09-24T18:03:34.613

Link: CVE-2018-25115

cve-icon Redhat

No data.