First published: Sat May 17 2025(Updated: )
A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared as critical. This vulnerability affects the function isUCPCameraNameChanged of the file /sbin/ucp. The manipulation of the argument CameraName leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
dlink DCS-932L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4842 has been declared critical due to a stack-based buffer overflow vulnerability.
To mitigate CVE-2025-4842, upgrade the D-Link DCS-932L camera firmware to the latest version available from the vendor.
Exploiting CVE-2025-4842 could allow an attacker to execute arbitrary code on the affected D-Link DCS-932L devices.
CVE-2025-4842 affects the D-Link DCS-932L security camera, specifically version 2.18.01.
CVE-2025-4842 exploits the isUCPCameraNameChanged function in /sbin/ucp, leading to a buffer overflow.