Improper Authorization in D-Link DIR-823G DDNS Service
CVE-2025-2359
Key Information:
Badges
Summary
A security concern has been identified in the D-Link DIR-823G device version 1.0.2B05_20181207, specifically within the SetDDNSSettings function of the DDNS Service component. This vulnerability arises from improper authorization due to the manipulation of the SOAPAction argument, which can be exploited remotely by unauthorized users. The affected products are no longer supported by the manufacturer, increasing the risk as the vulnerability is publicly known and may be actively exploited.
Affected Version(s)
DIR-823G 1.0.2B05_20181207
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved