CVE-2013-10069 PUBLISHED

D-Link Devices Unauthenticated RCE

Assigner: VulnCheck
Reserved: 05.08.2025 Published: 05.08.2025 Updated: 06.08.2025

The web interface of multiple D-Link routers, including DIR-600 rev B (≤2.14b01) and DIR-300 rev B (≤2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enabling persistent interactive shell access as root.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 10

Product Status

Vendor D-Link
Product DIR-600 rev B
Versions Default: unaffected
  • affected from * to 2.14b01 (incl.)
Vendor D-Link
Product DIR-300 rev B
Versions Default: unaffected
  • affected from * to 2.13 (incl.)

Credits

  • Michael Messner finder

References

Problem Types

  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE

Impacts

  • CAPEC-88 OS Command Injection