CVE-2025-4354

A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02 and classified as critical. Affected by this issue is the function check_dws_cookie of the file /storage. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dap-1520_firmware:1.10b04:beta02:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-1520:-:*:*:*:*:*:*:*

History

13 May 2025, 20:24

Type Values Removed Values Added
First Time Dlink dap-1520
Dlink
Dlink dap-1520 Firmware
CWE CWE-787
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 9.8
CPE cpe:2.3:o:dlink:dap-1520_firmware:1.10b04:beta02:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-1520:-:*:*:*:*:*:*:*
References () https://www.tenda.com.cn/ - () https://www.tenda.com.cn/ - Product
References () https://github.com/Ghostsuzhijian/Iot-/blob/main/DAP-1520_replace_special_char/DAP-1520_replace_special_char.md - () https://github.com/Ghostsuzhijian/Iot-/blob/main/DAP-1520_replace_special_char/DAP-1520_replace_special_char.md - Exploit
References () https://vuldb.com/?id.307472 - () https://vuldb.com/?id.307472 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.564719 - () https://vuldb.com/?submit.564719 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?ctiid.307472 - () https://vuldb.com/?ctiid.307472 - Permissions Required, VDB Entry

06 May 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-06 13:15

Updated : 2025-05-13 20:24


NVD link : CVE-2025-4354

Mitre link : CVE-2025-4354


JSON object : View

Products Affected

dlink

  • dap-1520
  • dap-1520_firmware
CWE
CWE-787

Out-of-bounds Write

CWE-121

Stack-based Buffer Overflow

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer