First published: Fri Apr 18 2025(Updated: )
A vulnerability has been found in D-Link DWR-M961 1.1.36 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formStaticDHCP of the component Authorization Interface. The manipulation of the argument Hostname leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.49 is able to address this issue. It is recommended to upgrade the affected component.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DWR-M961 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3785 is classified as a critical severity vulnerability.
To mitigate CVE-2025-3785, update the D-Link DWR-M961 to the latest firmware version provided by the vendor.
CVE-2025-3785 affects the Authorization Interface component of the D-Link DWR-M961.
CVE-2025-3785 is a stack-based buffer overflow vulnerability.
CVE-2025-3785 is caused by improper handling of the Hostname argument in the /boafrm/formStaticDHCP file.