A weakness has been identified in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
Metrics
Affected Vendors & Products
References
History
Mon, 01 Sep 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
D-link
D-link dir-816l |
|
Vendors & Products |
D-link
D-link dir-816l |
Sun, 31 Aug 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A weakness has been identified in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer. | |
Title | D-Link DIR-816L soap.cgi soapcgi_main os command injection | |
Weaknesses | CWE-77 CWE-78 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-08-31T11:32:06.961Z
Updated: 2025-08-31T11:32:06.961Z
Reserved: 2025-08-30T13:44:45.749Z
Link: CVE-2025-9727

No data.

Status : Received
Published: 2025-08-31T12:15:32.823
Modified: 2025-08-31T12:15:32.823
Link: CVE-2025-9727

No data.