Description
A vulnerability was found in D-Link DIR-825 and DIR-825R 1.0.5/4.5.1. Affected is the function handler_update_system_time of the file libdeuteron_modules.so of the component NTP Service. The manipulation results in os command injection. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-03-24
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS command injection
Action: Replace Device
AI Analysis

Impact

The vulnerability resides in the NTP Service component of certain D‑Link routers and allows remote attackers to execute arbitrary operating‑system commands. It is triggered when the handler_update_system_time function in libdeuteron_modules.so forwards untrusted data to a system call without proper sanitization, a flaw that corresponds to CWE‑77 and CWE‑78. If exploited, an attacker could gain full control of the device, enabling data exfiltration, configuration changes, and the use of the router as a foothold for further network attacks.

Affected Systems

The affected units are D‑Link DIR‑825 and DIR‑825R running firmware versions 1.0.5 and 4.5.1. These firmware releases are no longer supported by the vendor, meaning no official patch or security update is available for these legacy devices.

Risk and Exploitability

With a CVSS score of 8.6 the vulnerability is considered high risk and can be accessed remotely without authentication. No exploit intelligence places it in the CISA KEV catalog, and EPSS data is not available, but the lack of a vendor fix combined with the remaining public exposure of the devices raises the likelihood of real‑world exploitation.

Generated by OpenCVE AI on March 24, 2026 at 06:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace the router with a supported model or newer firmware
  • If replacement is not possible, disable the NTP service or block inbound NTP traffic from external networks
  • Restrict network access to the device by tightening firewall rules or isolating it on a separate VLAN
  • Monitor device logs for unexplained command execution or configuration changes
  • Verify that future firmware versions implement proper input validation for time synchronization functions

Generated by OpenCVE AI on March 24, 2026 at 06:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-825
D-link dir-825r
Vendors & Products D-link
D-link dir-825
D-link dir-825r

Tue, 24 Mar 2026 04:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DIR-825 and DIR-825R 1.0.5/4.5.1. Affected is the function handler_update_system_time of the file libdeuteron_modules.so of the component NTP Service. The manipulation results in os command injection. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-825/DIR-825R NTP Service libdeuteron_modules.so handler_update_system_time os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-24T13:33:31.838Z

Reserved: 2026-03-23T06:30:08.559Z

Link: CVE-2026-4627

cve-icon Vulnrichment

Updated: 2026-03-24T13:33:23.856Z

cve-icon NVD

Status : Deferred

Published: 2026-03-24T05:16:24.687

Modified: 2026-04-24T16:32:53.997

Link: CVE-2026-4627

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:40:12Z

Weaknesses