Логотип exploitDog
bind:CVE-2025-6898
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-6898

Количество 3

Количество 3

nvd логотип

CVE-2025-6898

около 2 месяцев назад

A vulnerability, which was classified as critical, has been found in D-Link DI-7300G+ 19.12.25A1. Affected by this issue is some unknown functionality of the file in proxy_client.asp. The manipulation of the argument proxy_srv/proxy_lanport/proxy_lanip/proxy_srvport leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-p2qm-477r-pcgw

около 2 месяцев назад

A vulnerability, which was classified as critical, has been found in D-Link DI-7300G+ 19.12.25A1. Affected by this issue is some unknown functionality of the file in proxy_client.asp. The manipulation of the argument proxy_srv/proxy_lanport/proxy_lanip/proxy_srvport leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2025-09356

около 2 месяцев назад

Уязвимость сценария proxy_client.asp микропрограммного обеспечения маршрутизаторов D-Link DI-7300G+, позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-6898

A vulnerability, which was classified as critical, has been found in D-Link DI-7300G+ 19.12.25A1. Affected by this issue is some unknown functionality of the file in proxy_client.asp. The manipulation of the argument proxy_srv/proxy_lanport/proxy_lanip/proxy_srvport leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-p2qm-477r-pcgw

A vulnerability, which was classified as critical, has been found in D-Link DI-7300G+ 19.12.25A1. Affected by this issue is some unknown functionality of the file in proxy_client.asp. The manipulation of the argument proxy_srv/proxy_lanport/proxy_lanip/proxy_srvport leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
0%
Низкий
около 2 месяцев назад
fstec логотип
BDU:2025-09356

Уязвимость сценария proxy_client.asp микропрограммного обеспечения маршрутизаторов D-Link DI-7300G+, позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.3
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу