Authentication Bypass Vulnerability in D-Link DHP-W310AV by D-Link
CVE-2025-1104

6.9MEDIUM

Key Information:

Vendor
D-link
Vendor
CVE Published:
7 February 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A vulnerability discovered in the D-Link DHP-W310AV 1.04 model allows attackers to bypass authentication through spoofing techniques. This flaw can be exploited remotely, enabling unauthorized users to gain access to sensitive functionalities without needing valid credentials. The implications of this vulnerability are significant, as attackers can potentially manipulate the device, leading to unauthorized actions that compromise the security of the network. Users of the D-Link DHP-W310AV are urged to apply the necessary security patches and monitor their systems for any suspicious activity.

Affected Version(s)

DHP-W310AV 1.04

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

HuangDow (VulDB User)
.