CVE-2025-9769Injection in D-link Di-7400g

Severity
2.4LOWNVD
EPSS
0.1%
top 78.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 1

Description

A security flaw has been discovered in D-Link DI-7400G+ 19.12.25A1. Affected is the function sub_478D28 of the file /mng_platform.asp. The manipulation of the argument addr with the input `echo 12345 > poc.txt` results in command injection. An attack on the physical device is feasible. The exploit has been released to the public and may be exploited.

CVSS vector

CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5d-link/di-7400g19.12.25A1

🔴Vulnerability Details

1
CVEList
D-Link DI-7400G+ mng_platform.asp sub_478D28 command injection2025-09-01

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS D-Link mng_platform.asp addr Parameter Command Injection Attempt (CVE-2025-57105, CVE-2025-9769)2025-08-22
CVE-2025-9769 — Injection in D-link Di-7400g | cvebase