Stack-based Buffer Overflow Vulnerability in D-Link DAP-1320 Products
CVE-2025-1539
Key Information:
Badges
Summary
A security vulnerability has been identified in D-Link DAP-1320 version 1.00, specifically within the function replace_special_char in the file /storagein.pd-XXXXXX. This flaw allows for a stack-based buffer overflow, which can be exploited remotely by attackers. Notably, this vulnerability affects devices that are no longer supported by D-Link, further emphasizing the significance of maintaining updated and secure products. The exploit method has already been disclosed, raising concerns for users of the affected devices. It is crucial for D-Link DAP-1320 users to be aware of potential threats and take necessary precautions to safeguard their network.
Affected Version(s)
DAP-1320 1.00
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved