First published: Tue May 06 2025(Updated: )
A vulnerability classified as critical was found in D-Link DIR-600L up to 2.07B01. This vulnerability affects the function wake_on_lan. The manipulation of the argument host leads to command injection. The attack can be initiated remotely. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-600L Firmware | <=2.07B01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4350 is classified as a critical vulnerability.
To fix CVE-2025-4350, update the D-Link DIR-600L to a version beyond 2.07B01.
CVE-2025-4350 is a command injection vulnerability affecting the wake_on_lan function.
Yes, CVE-2025-4350 can be exploited remotely.
CVE-2025-4350 affects the D-Link DIR-600L router with firmware versions up to 2.07B01.