← Back to CVEs
CVE-2025-9752
HIGH7.3
Description
A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE Details
CVSS v3.1 Score7.3
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published9/1/2025
Last Modified4/29/2026
Sourcenvd
Honeypot Sightings0
Affected Products
dlink:dir-852dlink:dir-852_firmware
Weaknesses (CWE)
CWE-77CWE-78CWE-78
References
https://github.com/i-Corner/cve/issues/18(cna@vuldb.com)
https://vuldb.com/?ctiid.322053(cna@vuldb.com)
https://vuldb.com/?id.322053(cna@vuldb.com)
https://vuldb.com/?submit.640590(cna@vuldb.com)
https://www.dlink.com/(cna@vuldb.com)
https://github.com/i-Corner/cve/issues/18(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.