CVE-2025-55583 – D-Link DIR-868L Command Injection Vulnerability

The following table lists the changes that have been made to the
CVE-2025-55583 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 28, 2025

    Action Type Old Value New Value
    Added Description D-Link DIR-868L B1 router firmware version FW2.05WWB02 contains an unauthenticated OS command injection vulnerability in the fileaccess.cgi component. The endpoint /dws/api/UploadFile accepts a pre_api_arg parameter that is passed directly to system-level shell execution functions without sanitization or authentication. Remote attackers can exploit this to execute arbitrary commands as root via crafted HTTP requests.
    Added Reference https://cybermaya.in/posts/Post-44/
    Added Reference https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10397
    Added Reference https://www.dlink.com/en/security-bulletin/
  • CVE Modified
    by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Aug. 28, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-78
    Added CWE CWE-306
    Added CWE CWE-668
    Added Reference https://cybermaya.in/posts/Post-44/
Share the Post:

Related Posts