Heap-based Buffer Overflow in D-Link DAP-1320 Vulnerable Function
CVE-2025-1538
Key Information:
Badges
Summary
A significant vulnerability has been identified in the D-Link DAP-1320 version 1.00, specifically within the set_ws_action function of the /dws/api/ file. This flaw results in a heap-based buffer overflow, which could be exploited remotely, potentially allowing attackers to manipulate system behavior or gain unauthorized access. This vulnerability primarily affects devices that are no longer supported by D-Link, making it critical for users to assess their risk and consider necessary mitigations.
Affected Version(s)
DAP-1320 1.00
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved