CVE-2025-10440

6.3 MEDIUM

📋 TL;DR

This CVE describes an OS command injection vulnerability in D-Link routers' jhttpd component via the usb_paswd.asp file. Attackers can execute arbitrary commands remotely by manipulating the 'hname' argument. Affected devices include D-Link DI-8100, DI-8100G, DI-8200, DI-8200G, DI-8003, and DI-8003G running specific firmware versions.

💻 Affected Systems

Products:
  • D-Link DI-8100
  • D-Link DI-8100G
  • D-Link DI-8200
  • D-Link DI-8200G
  • D-Link DI-8003
  • D-Link DI-8003G
Versions: 16.07.26A1, 17.12.20A1, 19.12.10A1
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the affected firmware versions are vulnerable by default. The jhttpd component handles HTTP requests and is typically enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary commands with root privileges, potentially leading to complete device takeover, data exfiltration, or use as a pivot point into internal networks.

🟠

Likely Case

Remote code execution allowing attackers to modify device configuration, install malware, or create persistent backdoors on vulnerable routers.

🟢

If Mitigated

Limited impact if devices are behind firewalls with restricted WAN access and proper network segmentation is implemented.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely, making internet-facing devices particularly vulnerable to widespread attacks.
🏢 Internal Only: MEDIUM - Internal devices are still vulnerable to attacks from compromised internal hosts or malicious insiders.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details have been publicly disclosed on GitHub, making exploitation relatively straightforward for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UNKNOWN

Vendor Advisory: UNKNOWN

Restart Required: No

Instructions:

Check D-Link's official security advisories for firmware updates. If available, download and apply the latest firmware from D-Link's support portal.

🔧 Temporary Workarounds

Disable USB password management

all

If USB password management functionality is not required, disable it to remove the vulnerable component.

Access router admin interface > USB Settings > Disable USB password management

Restrict network access

all

Implement firewall rules to restrict access to the router's management interface from untrusted networks.

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Isolate affected devices in a separate VLAN with strict access controls
  • Implement network monitoring and intrusion detection for suspicious traffic to/from these devices

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface: Admin > System > Firmware Information. Compare against affected versions.

Check Version:

ssh admin@router_ip 'cat /etc/version' or check web interface

Verify Fix Applied:

After applying any firmware update, verify the version no longer matches affected versions and test USB password functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to usb_paswd.asp with shell metacharacters in parameters
  • Unexpected process execution from jhttpd
  • Failed authentication attempts followed by command execution patterns

Network Indicators:

  • HTTP requests containing shell commands in URL parameters
  • Outbound connections from routers to suspicious IPs
  • Unusual traffic patterns from router management interfaces

SIEM Query:

source="router_logs" AND (url="*usb_paswd.asp*" AND (param="*;*" OR param="*|*" OR param="*`*"))

🔗 References

📤 Share & Export