Authentication Bypass Vulnerability in D-Link DHP-W310AV by D-Link
CVE-2025-1104
Key Information:
- Vendor
- D-link
- Status
- Vendor
- CVE Published:
- 7 February 2025
Badges
Summary
A vulnerability discovered in the D-Link DHP-W310AV 1.04 model allows attackers to bypass authentication through spoofing techniques. This flaw can be exploited remotely, enabling unauthorized users to gain access to sensitive functionalities without needing valid credentials. The implications of this vulnerability are significant, as attackers can potentially manipulate the device, leading to unauthorized actions that compromise the security of the network. Users of the D-Link DHP-W310AV are urged to apply the necessary security patches and monitor their systems for any suspicious activity.
Affected Version(s)
DHP-W310AV 1.04
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved