CVE-2013-10069

CRITICAL

D-Link DIR-600 DIR-300 - Command Injection

Title source: llm

Description

The web interface of multiple D-Link routers, including DIR-600 rev B (≤2.14b01) and DIR-300 rev B (≤2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enabling persistent interactive shell access as root.

Exploits (2)

exploitdb WRITEUP
by m-1-k-3 · textwebappshardware
https://www.exploit-db.com/exploits/24453
metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/dlink_dir_300_600_exec_noauth.rb

Scores

CVSS v3 9.8
EPSS 0.7168
EPSS Percentile 98.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-78
Status published

Affected Products (2)

dlink/dir-600_firmware < 2.14b01
dlink/dir-300_firmware < 2.13

Timeline

Published Aug 05, 2025
Tracked Since Feb 18, 2026