Логотип exploitDog
bind:CVE-2025-9752
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-9752

Количество 3

Количество 3

nvd логотип

CVE-2025-9752

3 месяца назад

A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-ccvf-h868-4gww

3 месяца назад

A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2025-10680

3 месяца назад

Уязвимость функци soapcgi_main() компонента SOAP Service файла soap.cgi микропрограммного обеспечения маршрутизаторов D-Link DIR-852, позволяющая нарушителю выполнить произвольные команды

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-9752

A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 7.3
0%
Низкий
3 месяца назад
github логотип
GHSA-ccvf-h868-4gww

A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 9.8
0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-10680

Уязвимость функци soapcgi_main() компонента SOAP Service файла soap.cgi микропрограммного обеспечения маршрутизаторов D-Link DIR-852, позволяющая нарушителю выполнить произвольные команды

CVSS3: 7.3
0%
Низкий
3 месяца назад

Уязвимостей на страницу