OS Command Injection (RCE) in D-Link DIR-600/300 rev B (2.14b01/2.13)
CVE-2013-10069 Published on August 5, 2025

D-Link Devices Unauthenticated RCE
The web interface of multiple D-Link routers, including DIR-600 rev B (2.14b01) and DIR-300 rev B (2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enabling persistent interactive shell access as root.

NVD

Weakness Type

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2013-10069 has been classified to as a Shell injection vulnerability or weakness.


Products Associated with CVE-2013-10069

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2013-10069 are published in these products:

 
 

Affected Versions

D-Link DIR-600 rev B: D-Link DIR-300 rev B:

Exploit Probability

EPSS
71.68%
Percentile
98.71%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.