Vulnerability Description
A weakness has been identified in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-816L Firmware | 2.06b01 |
| Dlink | Dir-816L | - |
Related Weaknesses (CWE)
References
- https://github.com/scanleale/IOT_sec/blob/main/DIR-816L.pdfExploitThird Party Advisory
- https://vuldb.com/?ctiid.322016Permissions RequiredVDB Entry
- https://vuldb.com/?id.322016Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.639698Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2025-9727?
CVE-2025-9727 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A weakness has been identified in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injecti...
How severe is CVE-2025-9727?
CVE-2025-9727 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-9727?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-816L Firmware, Dlink Dir-816L.