Rewterz
CVE-2025-5495 – NETGEAR WNR614 Firmware Vulnerability
June 4, 2025
Rewterz
CVE-2025-5492 – D-Link DI-500WF-WT Vulnerability
June 4, 2025

Multiple D-Link DCS-932L Vulnerabilities

Severity

High

Analysis Summary

CVE-2025-5571 CVSS:6.3

A vulnerability was found in D-Link DCS-932L 2.18.01. It has been classified as critical. Affected is the function setSystemAdmin of the file /setSystemAdmin. The manipulation of the argument AdminID leads to OS command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2025-5573 CVSS:6.5

A vulnerability was found in D-Link DCS-932L 2.18.01. It has been rated as critical. Affected by this issue is the function setSystemWizard/setSystemControl of the file /setSystemWizard. The manipulation of the argument AdminID leads to OS command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2025-5572 CVSS:9

A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared critical. Affected by this vulnerability is the function setSystemEmail of the file /setSystemEmail. The manipulation of the argument EmailSMTPPortNumber leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Impact

  • Buffer Overflow
  • Gain Access

Indicators of Compromise

CVE

  • CVE-2025-5571

  • CVE-2025-5572

  • CVE-2025-5573

Affected Vendors

  • D-Link

Affected Products

  • D-Link DCS-932L - 2.18.01

Remediation

Refer to the D-Link Website for patch, upgrade, or suggested workaround information.

D-Link Website