First published: Mon May 19 2025(Updated: )
A vulnerability, which was classified as critical, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This affects the function sub_41F4F0 of the file /H5/webgl.asp?tggl_port=0&remote_management=0&http_passwd=game&exec_service=admin-restart. The manipulation leads to unverified password change. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DI-7003GV2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4903 is classified as a critical vulnerability.
CVE-2025-4903 affects the remote management function of D-Link DI-7003GV2, potentially allowing unverified password manipulations.
Exploiting CVE-2025-4903 could lead to unauthorized administrative access and control over the device.
To mitigate risks associated with CVE-2025-4903, ensure your D-Link DI-7003GV2 device firmware is updated to the latest version.
As of now, there is no specific patch publicly available for CVE-2025-4903, but checking for firmware updates regularly is advisable.