D-Link DNS-320 FW v2.06B01 Revision Ax is affected by command injection in the system_mgr.cgi component, which can lead to remote arbitrary code execution.
https://securityaffairs.com/185135/malware/new-mirai-variant-shadowv2-tests-iot-exploits-amid-aws-disruption.html
https://www.theregister.com/2025/11/26/miraibased_botnet_shadowv2/
https://www.bleepingcomputer.com/news/security/new-shadowv2-botnet-malware-used-aws-outage-as-a-test-opportunity/
https://securityaffairs.com/183183/malware/rondodox-botnet-targets-56-flaws-across-30-device-types-worldwide.html
https://www.dlink.com/en/security-bulletin/
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-25506
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10183
https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675
Source: Mitre, NVD
Published: 2021-02-02
Updated: 2025-11-07
Known Exploited Vulnerability (KEV)
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.9384