CVE-2025-60854

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on D-Link R15 (AX1500) routers by manipulating the model name parameter during password change requests. Attackers can gain full control of affected devices, potentially compromising network security. All users running firmware version 1.20.01 or below are affected.

💻 Affected Systems

Products:
  • D-Link R15 (AX1500)
Versions: 1.20.01 and below
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web administration interface which is typically enabled by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to install persistent malware, intercept all network traffic, pivot to internal networks, and use the device as part of a botnet.

🟠

Likely Case

Attackers gain shell access to execute commands, potentially installing backdoors, stealing credentials, or using the router for DDoS attacks.

🟢

If Mitigated

If proper network segmentation and access controls are in place, impact may be limited to the router itself without lateral movement.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and the exploit requires no authentication, making them prime targets for automated attacks.
🏢 Internal Only: MEDIUM - While less exposed than internet-facing, internal attackers could still exploit this if they gain network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Command injection vulnerabilities are frequently weaponized quickly. The CVSS 9.8 score and unauthenticated nature make this highly attractive to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for latest firmware

Vendor Advisory: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10473

Restart Required: Yes

Instructions:

1. Log into router web interface. 2. Navigate to firmware update section. 3. Download latest firmware from D-Link support site. 4. Upload and apply firmware update. 5. Reboot router after update completes.

🔧 Temporary Workarounds

Disable remote administration

all

Prevent external access to web administration interface

Restrict admin access

all

Limit admin interface access to specific IP addresses only

🧯 If You Can't Patch

  • Segment router on isolated network segment
  • Implement strict firewall rules blocking all unnecessary inbound traffic to router

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under System Status or Administration settings

Check Version:

Check via web interface or SSH if enabled: cat /etc/version

Verify Fix Applied:

Verify firmware version is above 1.20.01 after applying update

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to password change endpoint with model name parameter containing shell metacharacters
  • Unexpected process execution from httpd

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting command and control communication

SIEM Query:

source="router_logs" AND (uri="/goform/formSetDeviceName" OR uri="/goform/formPasswordSetup") AND (param="model_name" OR param="model") AND (value MATCHES "[;&|`$()]+")

🔗 References

📤 Share & Export