Логотип exploitDog
bind:CVE-2025-60675
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-60675

Количество 3

Количество 3

nvd логотип

CVE-2025-60675

3 месяца назад

A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-9459-cp56-77p3

3 месяца назад

A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2025-14837

3 месяца назад

Уязвимость файла /tmp/new_qos.rule микропрограммного обеспечения маршрутизаторов D-link DIR-823G, позволяющая нарушителю выполнить произвольные команды

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-60675

A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device.

CVSS3: 5.4
1%
Низкий
3 месяца назад
github логотип
GHSA-9459-cp56-77p3

A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device.

CVSS3: 6.5
1%
Низкий
3 месяца назад
fstec логотип
BDU:2025-14837

Уязвимость файла /tmp/new_qos.rule микропрограммного обеспечения маршрутизаторов D-link DIR-823G, позволяющая нарушителю выполнить произвольные команды

CVSS3: 5.4
1%
Низкий
3 месяца назад

Уязвимостей на страницу