Insufficient Entropy Vulnerability in D-Link DCS-6517 and DCS-7517
CVE-2025-6931

6.3MEDIUM

Key Information:

Vendor

D-link

Vendor
CVE Published:
30 June 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-6931?

A vulnerability exists in D-Link DCS-6517 and DCS-7517 related to the improper generation of passwords resulting from insufficient entropy within the root password generation handler. This flaw allows for potential remote attack vectors where an attacker may exploit the weakness to reconstruct weak passwords. It is critical to note that this vulnerability affects products that have reached end-of-life and are no longer maintained by the vendor, rendering them susceptible to security risks. The complexity of exploitation is elevated, and the potential for successful exploitation may require advanced techniques.

Affected Version(s)

DCS-6517 2.02

DCS-7517 2.02

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

CookedMelon (VulDB User)
.
CVE-2025-6931 : Insufficient Entropy Vulnerability in D-Link DCS-6517 and DCS-7517