First published: Tue May 06 2025(Updated: )
A vulnerability classified as critical has been found in D-Link DIR-890L and DIR-806A1 up to 100CNb11/108B03. Affected is the function sub_175C8 of the file /htdocs/soap.cgi. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-890L/R Firmware | <=100CNb11/108B03 | |
D-Link DIR-806A1 | <=100CNb11/108B03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4340 is classified as a critical vulnerability.
To fix CVE-2025-4340, update your D-Link DIR-890L or DIR-806A1 to the latest firmware version available.
CVE-2025-4340 affects the D-Link DIR-890L and DIR-806A1 routers with firmware versions up to 100CNb11/108B03.
CVE-2025-4340 is a command injection vulnerability that can be exploited remotely.
Exploitation of CVE-2025-4340 may allow an attacker to execute arbitrary commands on the affected devices.