Unrated severityNVD Advisory· Published Oct 29, 2025· Updated Apr 7, 2026
D-Link DNS-343 ShareCenter <= 1.05 Command Injection via /goform/Mail_Test
CVE-2018-25120
Description
D-Link DNS-343 ShareCenter devices running firmware versions up to and including 1.05 contain a command injection vulnerability in the Mail Test functionality. The web maintenance script posts to the internal goForm endpoint '/goform/Mail_Test' and uses several form parameters directly in a call to a system email utility without proper input validation. An unauthenticated remote attacker can supply crafted form data that injects shell commands, resulting in execution as root on the device. NOTE: The DNS-343 product line has been declared end-of-life.
Affected products
2- D-Link/DNS-343 ShareCenterv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/jamesbercegay/advisories/blob/master/%5BGTSA-00128%5D%20D-Link%20DNS-343%20ShareCenter%201.05%20Remote%20Root.txtmitretechnical-descriptionexploit
- qkl.seebug.org/vuldb/ssvid-97088mitreexploit
- www.exploit-db.com/exploits/43845mitreexploit
- www.vulncheck.com/advisories/dlink-dns343-sharecenter-command-injection-via-goform-mail-testmitrethird-party-advisory
- www.dlink.com/al/sq/products/dns-343-sharecenter-4-bay-network-storage-enclosuremitreproduct
News mentions
0No linked articles in our index yet.