OS Command Injection (RCE) in D-Link DIR-600/300 rev B (2.14b01/2.13)
CVE-2013-10069 Published on August 5, 2025

D-Link Devices Unauthenticated RCE
The web interface of multiple D-Link routers, including DIR-600 rev B (2.14b01) and DIR-300 rev B (2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enabling persistent interactive shell access as root.

NVD

Weakness Type

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2013-10069 has been classified to as a Shell injection vulnerability or weakness.


Products Associated with CVE-2013-10069

stack.watch emails you whenever new vulnerabilities are published in D-Link Dir 600 Firmware or D-Link Dir 300 Firmware. Just hit a watch button to start following.

 
 

Affected Versions

D-Link DIR-600 rev B: D-Link DIR-300 rev B:

Exploit Probability

EPSS
71.68%
Percentile
98.73%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.