D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022.
References
| Link | Resource |
|---|---|
| https://seclists.org/fulldisclosure/2016/Feb/53 | Exploit Mailing List Third Party Advisory |
| https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088 | Patch Vendor Advisory |
| https://www.exploit-db.com/exploits/44760 | Exploit Third Party Advisory VDB Entry |
| https://seclists.org/fulldisclosure/2016/Feb/53 | Exploit Mailing List Third Party Advisory |
| https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088 | Patch Vendor Advisory |
| https://www.exploit-db.com/exploits/44760 | Exploit Third Party Advisory VDB Entry |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-20017 | US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
History
05 Nov 2025, 19:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-20017 - US Government Resource |
22 Oct 2025, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 02:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://seclists.org/fulldisclosure/2016/Feb/53 - Exploit, Mailing List, Third Party Advisory | |
| References | () https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088 - Patch, Vendor Advisory | |
| References | () https://www.exploit-db.com/exploits/44760 - Exploit, Third Party Advisory, VDB Entry |
21 Oct 2022, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://seclists.org/fulldisclosure/2016/Feb/53 - Exploit, Mailing List, Third Party Advisory | |
| References | (MISC) https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088 - Patch, Vendor Advisory | |
| References | (MISC) https://www.exploit-db.com/exploits/44760 - Exploit, Third Party Advisory, VDB Entry | |
| CWE | CWE-77 | |
| CPE | cpe:2.3:o:dlink:dsl-2750b_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dlink:dsl-2750b:-:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
19 Oct 2022, 05:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-10-19 05:15
Updated : 2025-11-05 19:24
NVD link : CVE-2016-20017
Mitre link : CVE-2016-20017
CVE.ORG link : CVE-2016-20017
JSON object : View
Products Affected
dlink
- dsl-2750b
- dsl-2750b_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
