A vulnerability was found in D-Link DIR-645 up to 1.05B01 and classified as critical. This issue affects the function ssdpcgi_main of the file /htdocs/cgibin of the component ssdpcgi. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00836}

epss

{'score': 0.00089}


Mon, 14 Jul 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-645
Dlink dir-645 Firmware
CPEs cpe:2.3:h:dlink:dir-645:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-645_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-645
Dlink dir-645 Firmware

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00627}

epss

{'score': 0.00836}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00498}

epss

{'score': 0.00627}


Wed, 09 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 08 Jul 2025 19:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DIR-645 up to 1.05B01 and classified as critical. This issue affects the function ssdpcgi_main of the file /htdocs/cgibin of the component ssdpcgi. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-645 ssdpcgi cgibin ssdpcgi_main command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-07-08T19:32:06.193Z

Updated: 2025-07-09T13:32:20.976Z

Reserved: 2025-07-07T08:36:00.812Z

Link: CVE-2025-7192

cve-icon Vulnrichment

Updated: 2025-07-09T13:32:12.649Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-08T20:15:30.830

Modified: 2025-07-14T15:15:31.173

Link: CVE-2025-7192

cve-icon Redhat

No data.