First published: Sat Mar 22 2025(Updated: )
A vulnerability has been found in D-Link DAP-1620 1.03 and classified as critical. This vulnerability affects the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-1620 | ||
All of | ||
Dlink DAP-1620 Firmware | =1.03 | |
Dlink Dap-1620 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2620 is classified as a critical vulnerability.
CVE-2025-2620 affects the Authentication Handler component of D-Link DAP-1620, potentially leading to a stack-based buffer overflow.
Exploiting CVE-2025-2620 could allow attackers to execute arbitrary code on affected D-Link DAP-1620 devices.
To mitigate CVE-2025-2620, users should update their D-Link DAP-1620 to the latest firmware version provided by D-Link.
Yes, CVE-2025-2620 specifically affects version 1.03 of the D-Link DAP-1620.