First published: Sat May 17 2025(Updated: )
A vulnerability was found in D-Link DCS-932L 2.18.01 and classified as critical. Affected by this issue is the function sub_404780 of the file /bin/gpio. The manipulation of the argument CameraName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
dlink DCS-932L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4841 is classified as critical due to its potential for remote exploitation and a stack-based buffer overflow.
To fix CVE-2025-4841, update the D-Link DCS-932L to the latest firmware version provided by D-Link.
CVE-2025-4841 affects the D-Link DCS-932L camera running firmware version 2.18.01.
CVE-2025-4841 is a stack-based buffer overflow vulnerability that can be exploited remotely.
Yes, successful exploitation of CVE-2025-4841 can lead to unauthorized access and complete system compromise.