Vulnerability Description
A vulnerability classified as critical has been found in D-Link DI-7300G+ 19.12.25A1. Affected is an unknown function of the file wget_test.asp. The manipulation of the argument url leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Di-7300G\+ Firmware | 19.12.25a1 |
| Dlink | Di-7300G\+ | - |
Related Weaknesses (CWE)
References
- https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdfExploitThird Party Advisory
- https://vuldb.com/?ctiid.314388Permissions RequiredVDB Entry
- https://vuldb.com/?id.314388Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.604441Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2025-6896?
CVE-2025-6896 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability classified as critical has been found in D-Link DI-7300G+ 19.12.25A1. Affected is an unknown function of the file wget_test.asp. The manipulation of the argument url leads to os comman...
How severe is CVE-2025-6896?
CVE-2025-6896 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-6896?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Di-7300G\+ Firmware, Dlink Di-7300G\+.