OS Command Injection (RCE) in D-Link DIR-600/300 rev B (2.14b01/2.13)
CVE-2013-10069 Published on August 5, 2025
D-Link Devices Unauthenticated RCE
The web interface of multiple D-Link routers, including DIR-600 rev B (2.14b01) and DIR-300 rev B (2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enabling persistent interactive shell access as root.
Weakness Type
What is a Shell injection Vulnerability?
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
CVE-2013-10069 has been classified to as a Shell injection vulnerability or weakness.
Products Associated with CVE-2013-10069
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2013-10069 are published in these products:
Affected Versions
D-Link DIR-600 rev B:- Version *, <= 2.14b01 is affected.
- Version *, <= 2.13 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.