CVE-2025-5572

A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared as critical. Affected by this vulnerability is the function setSystemEmail of the file /setSystemEmail. The manipulation of the argument EmailSMTPPortNumber leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dcs-932l_firmware:2.18.01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dcs-932l:-:*:*:*:*:*:*:*

History

06 Jun 2025, 18:48

Type Values Removed Values Added
First Time Dlink dcs-932l Firmware
Dlink
Dlink dcs-932l
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:o:dlink:dcs-932l_firmware:2.18.01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dcs-932l:-:*:*:*:*:*:*:*
References () https://vuldb.com/?ctiid.311029 - () https://vuldb.com/?ctiid.311029 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.311029 - () https://vuldb.com/?id.311029 - Third Party Advisory, VDB Entry
References () https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_43/43.md - () https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_43/43.md - Exploit
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product
References () https://vuldb.com/?submit.588466 - () https://vuldb.com/?submit.588466 - Third Party Advisory, VDB Entry

04 Jun 2025, 14:15

Type Values Removed Values Added
CWE CWE-121
CWE-119
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : unknown

04 Jun 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-04 06:15

Updated : 2025-06-06 18:48


NVD link : CVE-2025-5572

Mitre link : CVE-2025-5572


JSON object : View

Products Affected

dlink

  • dcs-932l_firmware
  • dcs-932l
CWE
CWE-787

Out-of-bounds Write