D-Link DNS-343 ShareCenter devices running firmware versions up to and including 1.05 contain a command injection vulnerability in the Mail Test functionality. The web maintenance script posts to the internal goForm endpoint '/goform/Mail_Test' and uses several form parameters directly in a call to a system email utility without proper input validation. An unauthenticated remote attacker can supply crafted form data that injects shell commands, resulting in execution as root on the device. NOTE: The DNS-343 product line has been declared end-of-life.
History

Fri, 28 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dns-343
Dlink dns-343 Firmware
CPEs cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-343_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dns-343
Dlink dns-343 Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 30 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dns-343
Vendors & Products D-link
D-link dns-343

Wed, 29 Oct 2025 19:00:00 +0000

Type Values Removed Values Added
Description D-Link DNS-343 ShareCenter devices running firmware versions up to and including 1.05 contain a command injection vulnerability in the Mail Test functionality. The web maintenance script posts to the internal goForm endpoint '/goform/Mail_Test' and uses several form parameters directly in a call to a system email utility without proper input validation. An unauthenticated remote attacker can supply crafted form data that injects shell commands, resulting in execution as root on the device. NOTE: The DNS-343 product line has been declared end-of-life.
Title D-Link DNS-343 ShareCenter <= 1.05 Command Injection via /goform/Mail_Test
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-10-29T18:39:03.581Z

Updated: 2025-10-30T17:37:43.230Z

Reserved: 2025-10-29T18:09:35.000Z

Link: CVE-2018-25120

cve-icon Vulnrichment

Updated: 2025-10-30T17:37:40.262Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-29T19:15:36.953

Modified: 2025-11-28T17:01:33.170

Link: CVE-2018-25120

cve-icon Redhat

No data.