CVE-2025-25895
Published: 18 February 2025
Summary
CVE-2025-25895 is a high-severity OS Command Injection (CWE-78) vulnerability in Dlink Dsl-3782 Firmware. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents OS command injection by requiring validation of untrusted inputs like the public_type parameter to block crafted malicious payloads.
Mitigates the specific vulnerability in D-Link DSL-3782 v1.01 by identifying, prioritizing, and applying flaw remediation such as firmware patches in a timely manner.
Limits the impact of successful command injection exploitation, which requires low privileges (PR:L), by enforcing least privilege on processes handling the vulnerable public_type parameter.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection directly enables arbitrary command execution on a network device (T1059.008) via exploitation of its exposed interface (T1190).
NVD Description
An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the public_type parameter. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet.
Deeper analysisAI
CVE-2025-25895, published on 2025-02-18, is an OS command injection vulnerability (CWE-78) in D-Link DSL-3782 v1.01, exploitable via the public_type parameter. The flaw enables attackers to execute arbitrary operating system commands by sending a crafted packet to the affected router.
According to its CVSS v3.1 base score of 8.0 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), the vulnerability can be exploited by attackers with adjacent network access and low privileges, requiring low complexity and no user interaction. Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability, potentially leading to full system control on the device.
Advisories are documented in references at https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_3_en.pdf.
Details
- CWE(s)