VYPR
Unrated severityNVD Advisory· Published Aug 27, 2025· Updated Apr 7, 2026

D-Link DIR-110/412/600/615/645/815 RCE via service.cgi

CVE-2018-25115

Description

Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21 UTC.

Affected products

9
  • Dlink/DIR-110llm-create
    Range: =1.03
  • Dlink/DIR-412llm-create
    Range: =1.03
  • Dlink/DIR-600llm-create
    Range: =1.03
  • D-Link/DIR-110v5
    Range: *
  • D-Link/DIR-412v5
    Range: *
  • D-Link/DIR-600v5
    Range: *
  • D-Link/DIR-615v5
    Range: *
  • D-Link/DIR-645v5
    Range: *
  • D-Link/DIR-815v5
    Range: *

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.