Command Injection Vulnerability in SetDMZSettings (CVE-2025-60673) 1. Vulnerability Overview 2. Exploitation Path 3. Vulnerable Binaries and ; the data flow traverses across these binaries. 4. 0-Day Command Injection Exploitation Path prog.cgi, line 8: receives user input, which is temporarily stored via line 15: . In , line 27: retrieves the stored value, which is concatenated and passed to line 46: , leading to command injection. 5. Proof of Concept (PoC) for Reproducing the Vulnerability