D-Link DIR-868L B1 router firmware version FW2.05WWB02 contains an unauthenticated OS command injection vulnerability in the fileaccess.cgi component. The endpoint /dws/api/UploadFile accepts a pre_api_arg parameter that is passed directly to system-level shell execution functions without sanitization or authentication. Remote attackers can exploit this to execute arbitrary commands as root via crafted HTTP requests.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-26076 D-Link DIR-868L B1 router firmware version FW2.05WWB02 contains an unauthenticated OS command injection vulnerability in the fileaccess.cgi component. The endpoint /dws/api/UploadFile accepts a pre_api_arg parameter that is passed directly to system-level shell execution functions without sanitization or authentication. Remote attackers can exploit this to execute arbitrary commands as root via crafted HTTP requests.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 09 Sep 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink dir-868l Firmware
CPEs cpe:2.3:h:dlink:dir-868l:b1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-868l_firmware:2.05b02:*:*:*:*:*:*:*
Vendors & Products Dlink dir-868l Firmware

Thu, 28 Aug 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-868l
Vendors & Products Dlink
Dlink dir-868l

Thu, 28 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-306
CWE-668
CWE-78
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 14:45:00 +0000

Type Values Removed Values Added
Description D-Link DIR-868L B1 router firmware version FW2.05WWB02 contains an unauthenticated OS command injection vulnerability in the fileaccess.cgi component. The endpoint /dws/api/UploadFile accepts a pre_api_arg parameter that is passed directly to system-level shell execution functions without sanitization or authentication. Remote attackers can exploit this to execute arbitrary commands as root via crafted HTTP requests.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-08-28T15:00:23.114Z

Reserved: 2025-08-13T00:00:00.000Z

Link: CVE-2025-55583

cve-icon Vulnrichment

Updated: 2025-08-28T14:59:32.243Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-28T15:16:02.700

Modified: 2025-09-09T18:41:54.723

Link: CVE-2025-55583

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-28T21:21:36Z