A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ and DI-8200G 17.12.20A1/19.12.25A1. This affects an unknown part of the file msp_info.htm. The manipulation of the argument flag/cmd/iface leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00836}

epss

{'score': 0.00085}


Mon, 14 Jul 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-7300g\+
Dlink di-7300g\+ Firmware
Dlink di-8200g
Dlink di-8200g Firmware
CPEs cpe:2.3:h:dlink:di-7300g\+:-:*:*:*:*:*:*:*
cpe:2.3:h:dlink:di-8200g:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-7300g\+_firmware:19.12.25a1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8200g_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink di-7300g\+
Dlink di-7300g\+ Firmware
Dlink di-8200g
Dlink di-8200g Firmware

Mon, 30 Jun 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Jun 2025 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ and DI-8200G 17.12.20A1/19.12.25A1. This affects an unknown part of the file msp_info.htm. The manipulation of the argument flag/cmd/iface leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title D-Link DI-7300G+/DI-8200G msp_info.htm os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-06-30T08:32:05.999Z

Updated: 2025-06-30T17:34:29.901Z

Reserved: 2025-06-29T11:56:11.016Z

Link: CVE-2025-6899

cve-icon Vulnrichment

Updated: 2025-06-30T17:34:25.420Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-30T09:15:27.160

Modified: 2025-07-14T17:19:26.013

Link: CVE-2025-6899

cve-icon Redhat

No data.