First published: Tue May 06 2025(Updated: )
A vulnerability classified as critical was found in D-Link DIR-880L up to 104WWb01. Affected by this vulnerability is the function sub_16570 of the file /htdocs/ssdpcgi of the component Request Header Handler. The manipulation of the argument HTTP_ST/REMOTE_ADDR/REMOTE_PORT/SERVER_ID leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-880L Firmware | <=104WWb01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4341 is classified as a critical vulnerability.
To address CVE-2025-4341, update the D-Link DIR-880L to the latest firmware version beyond 104WWb01.
CVE-2025-4341 affects the Request Header Handler function in the D-Link DIR-880L.
Versions of the D-Link DIR-880L up to and including 104WWb01 are vulnerable to CVE-2025-4341.
CVE-2025-4341 involves manipulation of arguments such as HTTP_ST, REMOTE_ADDR, REMOTE_PORT, and SERVER_ID.