First published: Mon Mar 17 2025(Updated: )
A vulnerability classified as critical has been found in D-Link DIR-823G 1.0.2B05_20181207. Affected is the function SetDDNSSettings of the file /HNAP1/ of the component DDNS Service. The manipulation of the argument SOAPAction leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-823G Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2359 is classified as a critical vulnerability.
To fix CVE-2025-2359, update the D-Link DIR-823G firmware to the latest version provided by D-Link.
CVE-2025-2359 allows improper authorization through the SetDDNSSettings function, potentially leading to unauthorized access.
CVE-2025-2359 specifically affects the D-Link DIR-823G model.
CVE-2025-2359 involves the DDNS Service component of the D-Link DIR-823G.