{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9026","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-14T07:15:30.188Z","datePublished":"2025-08-15T09:32:06.504Z","dateUpdated":"2025-08-15T14:57:03.873Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-15T09:32:06.504Z"},"title":"D-Link DIR-860L Simple Service Discovery Protocol cgibin ssdpcgi_main os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"D-Link","product":"DIR-860L","versions":[{"version":"2.04.B04","status":"affected"}],"modules":["Simple Service Discovery Protocol"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in D-Link DIR-860L 2.04.B04. This affects the function ssdpcgi_main of the file htdocs/cgibin of the component Simple Service Discovery Protocol. The manipulation leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"de","value":"Hiervon betroffen ist die Funktion ssdpcgi_main der Datei htdocs/cgibin der Komponente Simple Service Discovery Protocol. Mit der Manipulation mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-14T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-14T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-14T09:20:43.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"iC0rner (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.320091","name":"VDB-320091 | D-Link DIR-860L Simple Service Discovery Protocol cgibin ssdpcgi_main os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.320091","name":"VDB-320091 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.629946","name":"Submit #629946 | D-Link DIR-860L Rev.B 2.04.B04 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/i-Corner/cve/issues/17","tags":["exploit","issue-tracking"]},{"url":"https://www.dlink.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-15T14:56:50.323766Z","id":"CVE-2025-9026","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-15T14:57:03.873Z"}}]}}