A vulnerability was determined in D-Link DIR-852 1.00CN B09. This issue affects the function ssdpcgi_main of the file htodcs/cgibin of the component Simple Service Discovery Protocol Service. Executing manipulation of the argument ST can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://github.com/i-Corner/cve/issues/30 | Exploit Third Party Advisory Issue Tracking |
https://vuldb.com/?ctiid.324659 | Permissions Required VDB Entry |
https://vuldb.com/?id.324659 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.650660 | VDB Entry Third Party Advisory |
https://www.dlink.com/ | Product |
https://github.com/i-Corner/cve/issues/30 | Exploit Third Party Advisory Issue Tracking |
Configurations
Configuration 1 (hide)
AND |
|
History
22 Sep 2025, 18:20
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dlink dir-852 Firmware
Dlink dir-852 Dlink |
|
References | () https://github.com/i-Corner/cve/issues/30 - Exploit, Third Party Advisory, Issue Tracking | |
References | () https://vuldb.com/?ctiid.324659 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.324659 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.650660 - VDB Entry, Third Party Advisory | |
References | () https://www.dlink.com/ - Product | |
CPE | cpe:2.3:o:dlink:dir-852_firmware:1.00cn_b09:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-852:-:*:*:*:*:*:*:* |
18 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/i-Corner/cve/issues/30 - |
18 Sep 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-18 01:15
Updated : 2025-09-22 18:20
NVD link : CVE-2025-10629
Mitre link : CVE-2025-10629
CVE.ORG link : CVE-2025-10629
JSON object : View
Products Affected
dlink
- dir-852
- dir-852_firmware