{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9752","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-31T08:18:37.778Z","datePublished":"2025-09-01T00:02:06.532Z","dateUpdated":"2025-09-02T15:12:20.656Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-09-01T00:02:06.532Z"},"title":"D-Link DIR-852 SOAP Service soap.cgi soapcgi_main os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"D-Link","product":"DIR-852","versions":[{"version":"1.00CN B09","status":"affected"}],"modules":["SOAP Service"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"de","value":"Es wurde eine Schwachstelle in D-Link DIR-852 1.00CN B09 entdeckt. Betroffen ist die Funktion soapcgi_main der Datei soap.cgi der Komponente SOAP Service. Die Manipulation des Arguments service führt zu os command injection. Ein Angriff ist aus der Distanz möglich. Der Exploit ist öffentlich verfügbar und könnte genutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-31T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-31T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-31T10:23:47.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"iC0rner (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.322053","name":"VDB-322053 | D-Link DIR-852 SOAP Service soap.cgi soapcgi_main os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.322053","name":"VDB-322053 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.640590","name":"Submit #640590 | D-Link DIR-852 1.00CN B09 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/i-Corner/cve/issues/18","tags":["exploit","issue-tracking"]},{"url":"https://www.dlink.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"references":[{"url":"https://github.com/i-Corner/cve/issues/18","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-02T14:34:23.295632Z","id":"CVE-2025-9752","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-02T15:12:20.656Z"}}]}}