Severity
6.9MEDIUM
EPSS
0.3%
top 47.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 1
Latest updateNov 17

Description

A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5d-link/dir-8521.00CN B09
NVDdlink/dir-852_firmware1.00cn_b09

🔴Vulnerability Details

2
GHSA
GHSA-ccvf-h868-4gww: A security vulnerability has been detected in D-Link DIR-852 12025-09-04
CVEList
D-Link DIR-852 SOAP Service soap.cgi soapcgi_main os command injection2025-09-01

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS D-Link soap.cgi service Parameter Command Injection Attempt (CVE-2025-9752)2025-11-17