D-Link Router DIR-868L A1 FW106KRb01.bin has an unauthenticated remote code execution vulnerability in the cgibin binary. The HNAP service provided by cgibin does not filter the HTTP SOAPAction header field. The unauthenticated remote attacker can execute the shell command.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 20 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
cvssV3_1
|
Wed, 19 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | D-Link Router DIR-868L A1 FW106KRb01.bin has an unauthenticated remote code execution vulnerability in the cgibin binary. The HNAP service provided by cgibin does not filter the HTTP SOAPAction header field. The unauthenticated remote attacker can execute the shell command. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-20T15:39:00.429Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63932
Updated: 2025-11-20T15:03:04.307Z
Status : Received
Published: 2025-11-19T20:15:53.817
Modified: 2025-11-20T16:16:00.923
Link: CVE-2025-63932
No data.
OpenCVE Enrichment
No data.