A security vulnerability has been detected in D-Link DI-500WF 14.04.10A1T. The impacted element is an unknown function of the file /version_upgrade.asp of the component jhttpd. The manipulation of the argument path leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
https://vuldb.com/?submit.640394
https://vuldb.com/?ctiid.322044
https://github.com/physicszq/Routers/tree/main/tmp/01
https://github.com/physicszq/Routers/blob/main/tmp/01/poc.py
Published: 2025-08-31
Updated: 2025-09-02
Base Score: 5.8
Vector: CVSS2#AV:N/AC:L/Au:M/C:P/I:P/A:P
Severity: Medium
Base Score: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Severity: Medium
Base Score: 5.1
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.00207