CVE-2025-6896

A vulnerability classified as critical has been found in D-Link DI-7300G+ 19.12.25A1. Affected is an unknown function of the file wget_test.asp. The manipulation of the argument url leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf Exploit Third Party Advisory
https://vuldb.com/?ctiid.314388 Permissions Required VDB Entry
https://vuldb.com/?id.314388 Third Party Advisory VDB Entry
https://vuldb.com/?submit.604441 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:di-7300g\+_firmware:19.12.25a1:*:*:*:*:*:*:*
cpe:2.3:h:dlink:di-7300g\+:-:*:*:*:*:*:*:*

History

14 Jul 2025, 17:19

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-30 07:15

Updated : 2025-07-14 17:19


NVD link : CVE-2025-6896

Mitre link : CVE-2025-6896

CVE.ORG link : CVE-2025-6896


JSON object : View

Products Affected

dlink

  • di-7300g\+_firmware
  • di-7300g\+
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')