Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 06 Dec 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink r15 Firmware
|
|
| CPEs | cpe:2.3:h:dlink:r15:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:r15_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink r15 Firmware
|
Wed, 03 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Wed, 03 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink r15 |
|
| Vendors & Products |
Dlink
Dlink r15 |
Tue, 02 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in D-Link R15 (AX1500) 1.20.01 and below. By manipulating the model name parameter during a password change request in the web administrator page, it is possible to trigger a command injection in httpd. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-03T15:08:44.738Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60854
Updated: 2025-12-03T15:08:20.005Z
Status : Analyzed
Published: 2025-12-02T18:15:48.600
Modified: 2025-12-06T00:00:26.173
Link: CVE-2025-60854
No data.
OpenCVE Enrichment
Updated: 2025-12-03T12:09:53Z