A vulnerability classified as critical has been found in D-Link DIR-600L up to 2.07B01. This affects the function formSysCmd. The manipulation of the argument host leads to command injection. It is possible to initiate the attack remotely. This vulnerability only affects products that are no longer supported by the maintainer.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/jylsec/vuldb/blob/main/D-Link/dlink_dir600l/Command_injection-formSysCmd-sysCmd/README.md | Third Party Advisory Broken Link | 
| https://vuldb.com/?ctiid.307467 | Permissions Required | 
| https://vuldb.com/?id.307467 | Third Party Advisory VDB Entry | 
| https://vuldb.com/?submit.558302 | Third Party Advisory VDB Entry | 
| https://www.dlink.com/ | Product | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    12 May 2025, 17:30
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-05-06 12:15
Updated : 2025-05-12 17:30
NVD link : CVE-2025-4349
Mitre link : CVE-2025-4349
CVE.ORG link : CVE-2025-4349
JSON object : View
Products Affected
                dlink
- dir-600l_firmware
 - dir-600l
 
