CVE-2025-57105

The DI-7400G+ router has a command injection vulnerability, which allows attackers to execute arbitrary commands on the device. The sub_478D28 function in in mng_platform.asp, and sub_4A12DC function in wayos_ac_server.asp of the jhttpd program, with the parameter ac_mng_srv_host.
Configurations

No configuration.

History

26 Aug 2025, 14:15

Type Values Removed Values Added
CWE CWE-77
Summary
  • (es) El enrutador DI-7400G+ presenta una vulnerabilidad de inyección de comandos que permite a los atacantes ejecutar comandos arbitrarios en el dispositivo. La función sub_478D28 se encuentra en mng_platform.asp y la función sub_4A12DC en wayos_ac_server.asp del programa jhttpd, con el parámetro ac_mng_srv_host.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/xyh4ck/iot_poc - () https://github.com/xyh4ck/iot_poc -

22 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-22 17:15

Updated : 2025-08-26 14:15


NVD link : CVE-2025-57105

Mitre link : CVE-2025-57105

CVE.ORG link : CVE-2025-57105


JSON object : View

Products Affected

No product.

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')