Vulnerability Details : CVE-2025-1538
A vulnerability classified as critical was found in D-Link DAP-1320 1.00. Affected by this vulnerability is the function set_ws_action of the file /dws/api/. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Vulnerability category: Overflow
Products affected by CVE-2025-1538
- cpe:2.3:o:dlink:dap-1320_firmware:1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2025-1538
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 32 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2025-1538
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
AV:N/AC:L/Au:S/C:C/I:C/A:C |
N/A
|
N/A
|
VulDB | 2025-02-21 | |
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
VulDB | 2025-02-21 |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
N/A
|
N/A
|
VulDB | 2025-02-21 |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
N/A
|
N/A
|
VulDB | 2025-02-21 |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
VulDB | 2025-02-21 |
8.7
|
HIGH | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/V... |
N/A
|
N/A
|
VulDB | 2025-02-21 |
8.7
|
HIGH | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/V... |
N/A
|
N/A
|
VulDB | 2025-02-21 |
CWE ids for CVE-2025-1538
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by:
- 1af790b2-7ee1-4545-860a-a788eba489b5 (Primary)
- cna@vuldb.com (Secondary)
-
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().Assigned by:
- 1af790b2-7ee1-4545-860a-a788eba489b5 (Primary)
- cna@vuldb.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2025-1538
-
https://legacy.us.dlink.com/pages/product.aspx?id=4b2bbe2e3f1d440ea65bc56c7e3dcc5c
D-Link | Legacy ProductsProduct
-
https://vuldb.com/?id.296479
CVE-2025-1538 D-Link DAP-1320 api set_ws_action heap-based overflowPermissions Required
-
https://vuldb.com/?submit.497301
Third Party Advisory
-
https://vuldb.com/?ctiid.296479
Permissions Required
-
https://www.dlink.com/
Smart Home, SMB and Enterprise solutions | D-LinkProduct
-
https://tasty-foxtrot-3a8.notion.site/D-link-DAP-1320-set_ws_action-Vulnerability-1950448e61958049be3cc606d434bc9d
Exploit;Third Party Advisory
-
https://tasty-foxtrot-3a8.notion.site/D-link-DAP-1320-set_ws_action-Vulnerability-1950448e61958049be3cc606d434bc9d?pvs=74
Exploit
Jump to