D-Link DSL-2750B Devices < 1.05 Command Injection (CVE-2016-20017)

critical Nessus Plugin ID 241512

Synopsis

The remote router is affected by a command injection vulnerability.

Description

D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022.

Note that Nessus has not tested for this issue but has instead relied only on the router's self-reported model.

Solution

Upgrade to a supported device.

See Also

http://www.nessus.org/u?8954cd55

Plugin Details

Severity: Critical

ID: 241512

File Name: d-link_router_cve-2016-20017.nasl

Version: 1.1

Type: remote

Family: CGI abuses

Published: 7/8/2025

Updated: 7/8/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-20017

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/h:d-link:dsl-2750b

Required KB Items: installed_sw/D-Link Routers

Patch Publication Date: 10/19/2022

Vulnerability Publication Date: 10/19/2022

CISA Known Exploited Vulnerability Due Dates: 1/29/2024

Reference Information

CVE: CVE-2016-20017