CVE-2025-5495 – NETGEAR WNR614 Firmware Vulnerability
June 4, 2025CVE-2025-5492 – D-Link DI-500WF-WT Vulnerability
June 4, 2025CVE-2025-5495 – NETGEAR WNR614 Firmware Vulnerability
June 4, 2025CVE-2025-5492 – D-Link DI-500WF-WT Vulnerability
June 4, 2025Severity
High
Analysis Summary
CVE-2025-5571 CVSS:6.3
A vulnerability was found in D-Link DCS-932L 2.18.01. It has been classified as critical. Affected is the function setSystemAdmin of the file /setSystemAdmin. The manipulation of the argument AdminID leads to OS command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-5573 CVSS:6.5
A vulnerability was found in D-Link DCS-932L 2.18.01. It has been rated as critical. Affected by this issue is the function setSystemWizard/setSystemControl of the file /setSystemWizard. The manipulation of the argument AdminID leads to OS command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-5572 CVSS:9
A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared critical. Affected by this vulnerability is the function setSystemEmail of the file /setSystemEmail. The manipulation of the argument EmailSMTPPortNumber leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Impact
- Buffer Overflow
- Gain Access
Indicators of Compromise
CVE
CVE-2025-5571
CVE-2025-5572
CVE-2025-5573
Affected Vendors
- D-Link
Affected Products
- D-Link DCS-932L - 2.18.01
Remediation
Refer to the D-Link Website for patch, upgrade, or suggested workaround information.