PT-2025-35092 · D Link · D-Link Dir-868L

Shaunak Ganorkar

·

Published

2025-08-28

·

Updated

2025-08-29

·

CVE-2025-55583

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

D-Link DIR-868L B1 router firmware version FW2.05WWB02

Description:

The D-Link DIR-868L B1 router firmware version FW2.05WWB02 contains an unauthenticated OS command injection vulnerability in the `fileaccess.cgi` component. The `/dws/api/UploadFile` API endpoint accepts a `pre api arg` parameter which is passed directly to system-level shell execution functions without proper sanitization or authentication. This allows remote attackers to execute arbitrary commands as root through crafted HTTP requests.

Recommendations:

Update to a newer version of the firmware that addresses this issue.

As a temporary workaround, restrict access to the `/dws/api/UploadFile` endpoint.

Avoid using the `pre api arg` parameter in the affected API endpoint until the issue is resolved.

Exploit

Fix

Missing Authentication

Exposure of Resource to Wrong Sphere

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2025-55583

Affected Products

D-Link Dir-868L