A Command Injection Vulnerability has been discovered in the DHCP daemon service of D-Link DIR895LA1 v102b07. The vulnerability exists in the lease renewal processing logic where the DHCP hostname parameter is directly concatenated into a system command without proper sanitization. When a DHCP client renews an existing lease with a malicious hostname, arbitrary commands can be executed with root privileges.
References
| Link | Resource |
|---|---|
| https://tzh00203.notion.site/D-Link-DIR895LA1-v102b07-Command-Injection-in-DHCPd-2d4b5c52018a80a1a5ccfb317b308861?source=copy_link | Third Party Advisory Exploit |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-09 17:15
Updated : 2026-02-10 19:48
NVD link : CVE-2025-69542
Mitre link : CVE-2025-69542
CVE.ORG link : CVE-2025-69542
JSON object : View
Products Affected
dlink
- dir-895la1
- dir-895la1_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
