{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-11335","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-05T15:42:21.663Z","datePublished":"2025-10-06T12:32:09.515Z","dateUpdated":"2025-10-06T20:01:00.911Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-06T12:32:09.515Z"},"title":"D-Link DI-7100G C1 jhttpd msp_info.htm sub_46409C command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"D-Link","product":"DI-7100G C1","versions":[{"version":"20250928","status":"affected"}],"modules":["jhttpd"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in D-Link DI-7100G C1 up to 20250928. Affected by this vulnerability is the function sub_46409C of the file /msp_info.htm?flag=qos of the component jhttpd. This manipulation of the argument iface causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited."},{"lang":"de","value":"In D-Link DI-7100G C1 up to 20250928 wurde eine Schwachstelle gefunden. Hierbei geht es um die Funktion sub_46409C der Datei /msp_info.htm?flag=qos der Komponente jhttpd. Durch Beeinflussen des Arguments iface mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit ist öffentlich verfügbar und könnte genutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-05T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-06T14:31:07.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"sheratan (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.327218","name":"VDB-327218 | D-Link DI-7100G C1 jhttpd msp_info.htm sub_46409C command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.327218","name":"VDB-327218 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.664597","name":"Submit #664597 | D-Link DI-7100G C1 Command Injection","tags":["third-party-advisory"]},{"url":"https://www.yuque.com/jh0ng/vmpda6/fpqlhpkb0orgseav","tags":["related"]},{"url":"https://www.yuque.com/jh0ng/vmpda6/fpqlhpkb0orgseav#DOhrV","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-06T20:00:52.220100Z","id":"CVE-2025-11335","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-06T20:01:00.911Z"}}]}}