D-Link DAP-1325 firmware version 1.01 contains a broken access control vulnerability that allows unauthenticated attackers to download device configuration settings without authentication. Attackers can exploit the /cgi-bin/ExportSettings.sh endpoint to retrieve sensitive configuration information by directly accessing the export settings script.
Metrics
Affected Vendors & Products
References
History
Wed, 17 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink dap-1325 |
|
| Vendors & Products |
Dlink
Dlink dap-1325 |
Tue, 16 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Dec 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | D-Link DAP-1325 firmware version 1.01 contains a broken access control vulnerability that allows unauthenticated attackers to download device configuration settings without authentication. Attackers can exploit the /cgi-bin/ExportSettings.sh endpoint to retrieve sensitive configuration information by directly accessing the export settings script. | |
| Title | D-Link DAP-1325 Hardware A1 Unauthenticated Configuration Download | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-16T17:06:19.762Z
Updated: 2025-12-16T21:44:51.912Z
Reserved: 2025-12-16T00:10:40.313Z
Link: CVE-2023-53896
Updated: 2025-12-16T21:44:48.853Z
Status : Awaiting Analysis
Published: 2025-12-16T18:16:06.537
Modified: 2025-12-18T15:08:06.237
Link: CVE-2023-53896
No data.