CVE-2025-1539

A vulnerability, which was classified as critical, has been found in D-Link DAP-1320 1.00. Affected by this issue is the function replace_special_char of the file /storagein.pd-XXXXXX. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dap-1320_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-1320:-:*:*:*:*:*:*:*

History

25 Feb 2025, 20:29

Type Values Removed Values Added
CPE cpe:2.3:o:dlink:dap-1320_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-1320:-:*:*:*:*:*:*:*
First Time Dlink dap-1320
Dlink dap-1320 Firmware
Dlink
CWE CWE-121
CWE-119
CWE-787
References () https://vuldb.com/?submit.497496 - () https://vuldb.com/?submit.497496 - Third Party Advisory
References () https://tasty-foxtrot-3a8.notion.site/D-link-DAP-1320-replace_special_char-Vulnerability-1960448e6195809c94f9fd2ff1f59bcf?pvs=4 - () https://tasty-foxtrot-3a8.notion.site/D-link-DAP-1320-replace_special_char-Vulnerability-1960448e6195809c94f9fd2ff1f59bcf?pvs=4 - Third Party Advisory
References () https://vuldb.com/?id.296480 - () https://vuldb.com/?id.296480 - Permissions Required
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product
References () https://legacy.us.dlink.com/pages/product.aspx?id=4b2bbe2e3f1d440ea65bc56c7e3dcc5c - () https://legacy.us.dlink.com/pages/product.aspx?id=4b2bbe2e3f1d440ea65bc56c7e3dcc5c - Product
References () https://vuldb.com/?ctiid.296480 - () https://vuldb.com/?ctiid.296480 - Permissions Required
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 9.8

21 Feb 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-21 15:15

Updated : 2025-02-25 20:29


NVD link : CVE-2025-1539

Mitre link : CVE-2025-1539


JSON object : View

Products Affected

dlink

  • dap-1320
  • dap-1320_firmware
CWE
CWE-787

Out-of-bounds Write