Description
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog.cgi` and `librcm.so` binaries. The `sub_4455BC` function in `prog.cgi` stores user-supplied `SetDMZSettings/IPAddress` values in NVRAM via `nvram_safe_set("dmz_ipaddr", ...)`. These values are later retrieved in the `DMZ_run` function of `librcm.so` using `nvram_safe_get` and concatenated into `iptables` shell commands executed via `twsystem()` without any sanitization. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device through specially crafted HTTP requests to the router's web interface.
INFO
Published Date :
2025-11-13T00:00:00.000Z
Last Modified :
2025-11-14T16:15:58.120Z
Source :
mitre
AFFECTED PRODUCTS
The following products are affected by CVE-2025-60700 vulnerability.
| Vendors | Products |
|---|---|
| Dlink |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-60700.