Vulnerabilites related to D-Link - DI-7003GV2
CVE-2025-4901 (GCVE-0-2025-4901)
Vulnerability from cvelistv5
Published
2025-05-18 23:31
Modified
2025-05-19 14:01
Severity ?
5.3 (Medium) - CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
VLAI Severity ?
EPSS score ?
Summary
A vulnerability classified as problematic was found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected by this vulnerability is the function sub_41E304 of the file /H5/state_view.data of the component HTTP Endpoint. The manipulation leads to information disclosure. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.309457 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.309457 | signature, permissions-required | |
https://vuldb.com/?submit.578049 | third-party-advisory | |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/state_view.md | exploit | |
https://www.dlink.com/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
D-Link | DI-7003GV2 |
Version: 24.04.18D1 R(68125) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4901", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-19T14:01:02.525211Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-19T14:01:07.425Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/state_view.md" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "HTTP Endpoint" ], "product": "DI-7003GV2", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "24.04.18D1 R(68125)" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "153528990 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected by this vulnerability is the function sub_41E304 of the file /H5/state_view.data of the component HTTP Endpoint. The manipulation leads to information disclosure. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In D-Link DI-7003GV2 24.04.18D1 R(68125) wurde eine problematische Schwachstelle entdeckt. Betroffen ist die Funktion sub_41E304 der Datei /H5/state_view.data der Komponente HTTP Endpoint. Mittels dem Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 3.3, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Information Disclosure", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-18T23:31:04.835Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-309457 | D-Link DI-7003GV2 HTTP Endpoint state_view.data sub_41E304 information disclosure", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.309457" }, { "name": "VDB-309457 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.309457" }, { "name": "Submit #578049 | D-Link DI-7003GV2 24.04.18D1 R(68125) Exposure of Sensitive System Information to an Unauthorized Cont", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578049" }, { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/state_view.md" }, { "tags": [ "product" ], "url": "https://www.dlink.com/" } ], "timeline": [ { "lang": "en", "time": "2025-05-17T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-17T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-17T15:11:24.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DI-7003GV2 HTTP Endpoint state_view.data sub_41E304 information disclosure" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4901", "datePublished": "2025-05-18T23:31:04.835Z", "dateReserved": "2025-05-17T13:06:08.268Z", "dateUpdated": "2025-05-19T14:01:07.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4755 (GCVE-0-2025-4755)
Vulnerability from cvelistv5
Published
2025-05-16 07:00
Modified
2025-05-16 15:31
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125). It has been classified as critical. This affects the function sub_497DE4 of the file /H5/netconfig.asp. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.309057 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.309057 | signature, permissions-required | |
https://vuldb.com/?submit.571073 | third-party-advisory | |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/netconfig.md | exploit | |
https://www.dlink.com/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
D-Link | DI-7003GV2 |
Version: 24.04.18D1 R(68125) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4755", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-16T15:30:42.494059Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-16T15:31:03.152Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "DI-7003GV2", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "24.04.18D1 R(68125)" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "153528990 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125). It has been classified as critical. This affects the function sub_497DE4 of the file /H5/netconfig.asp. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in D-Link DI-7003GV2 24.04.18D1 R(68125) ausgemacht. Sie wurde als kritisch eingestuft. Es geht dabei um die Funktion sub_497DE4 der Datei /H5/netconfig.asp. Dank Manipulation mit unbekannten Daten kann eine improper authentication-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-16T07:00:09.689Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-309057 | D-Link DI-7003GV2 netconfig.asp sub_497DE4 improper authentication", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.309057" }, { "name": "VDB-309057 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.309057" }, { "name": "Submit #571073 | D-Link DI-7003GV2 24.04.18D1 R(68125) Exposure of Sensitive System Information to an Unauthorized Cont", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.571073" }, { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/netconfig.md" }, { "tags": [ "product" ], "url": "https://www.dlink.com/" } ], "timeline": [ { "lang": "en", "time": "2025-05-15T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-15T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-15T11:08:27.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DI-7003GV2 netconfig.asp sub_497DE4 improper authentication" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4755", "datePublished": "2025-05-16T07:00:09.689Z", "dateReserved": "2025-05-15T09:03:12.380Z", "dateUpdated": "2025-05-16T15:31:03.152Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4751 (GCVE-0-2025-4751)
Vulnerability from cvelistv5
Published
2025-05-16 06:00
Modified
2025-05-16 13:14
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
VLAI Severity ?
EPSS score ?
Summary
A vulnerability, which was classified as problematic, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected is an unknown function of the file /index.data. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.309054 | vdb-entry | |
https://vuldb.com/?ctiid.309054 | signature, permissions-required | |
https://vuldb.com/?submit.571070 | third-party-advisory | |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/index.md | exploit | |
https://www.dlink.com/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
D-Link | DI-7003GV2 |
Version: 24.04.18D1 R(68125) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4751", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-16T13:14:03.269538Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-16T13:14:05.881Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/index.md" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "DI-7003GV2", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "24.04.18D1 R(68125)" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "153528990 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected is an unknown function of the file /index.data. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in D-Link DI-7003GV2 24.04.18D1 R(68125) gefunden. Sie wurde als problematisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /index.data. Durch das Beeinflussen mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Information Disclosure", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-16T06:00:06.635Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-309054 | D-Link DI-7003GV2 index.data information disclosure", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.309054" }, { "name": "VDB-309054 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.309054" }, { "name": "Submit #571070 | D-Link DI-7003GV2 24.04.18D1 R(68125) Improper Access Controls", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.571070" }, { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/index.md" }, { "tags": [ "product" ], "url": "https://www.dlink.com/" } ], "timeline": [ { "lang": "en", "time": "2025-05-15T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-15T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-15T11:08:23.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DI-7003GV2 index.data information disclosure" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4751", "datePublished": "2025-05-16T06:00:06.635Z", "dateReserved": "2025-05-15T09:03:04.064Z", "dateUpdated": "2025-05-16T13:14:05.881Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4749 (GCVE-0-2025-4749)
Vulnerability from cvelistv5
Published
2025-05-16 05:00
Modified
2025-05-16 15:55
Severity ?
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
VLAI Severity ?
EPSS score ?
CWE
- CWE-404 - Denial of Service
Summary
A vulnerability classified as critical was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This vulnerability affects the function sub_4983B0 of the file /H5/backup.asp?opt=reset of the component Factory Reset Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.309052 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.309052 | signature, permissions-required | |
https://vuldb.com/?submit.571068 | third-party-advisory | |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/backup.md | exploit | |
https://www.dlink.com/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
D-Link | DI-7003GV2 |
Version: 24.04.18D1 R(68125) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4749", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-16T15:54:53.918477Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-16T15:55:04.593Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "Factory Reset Handler" ], "product": "DI-7003GV2", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "24.04.18D1 R(68125)" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "153528990 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This vulnerability affects the function sub_4983B0 of the file /H5/backup.asp?opt=reset of the component Factory Reset Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In D-Link DI-7003GV2 24.04.18D1 R(68125) wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist die Funktion sub_4983B0 der Datei /H5/backup.asp?opt=reset der Komponente Factory Reset Handler. Durch das Manipulieren mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 8.7, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "Denial of Service", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-16T05:00:09.105Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-309052 | D-Link DI-7003GV2 Factory Reset backup.asp sub_4983B0 denial of service", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.309052" }, { "name": "VDB-309052 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.309052" }, { "name": "Submit #571068 | D-Link DI-7003GV2 24.04.18D1 R(68125) Improper Access Controls", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.571068" }, { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/backup.md" }, { "tags": [ "product" ], "url": "https://www.dlink.com/" } ], "timeline": [ { "lang": "en", "time": "2025-05-15T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-15T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-15T11:08:20.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DI-7003GV2 Factory Reset backup.asp sub_4983B0 denial of service" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4749", "datePublished": "2025-05-16T05:00:09.105Z", "dateReserved": "2025-05-15T09:02:59.051Z", "dateUpdated": "2025-05-16T15:55:04.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4753 (GCVE-0-2025-4753)
Vulnerability from cvelistv5
Published
2025-05-16 06:31
Modified
2025-05-16 15:34
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
VLAI Severity ?
EPSS score ?
Summary
A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. Affected by this issue is some unknown functionality of the file /login.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.309056 | vdb-entry | |
https://vuldb.com/?ctiid.309056 | signature, permissions-required | |
https://vuldb.com/?submit.571072 | third-party-advisory | |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/login.md | exploit | |
https://www.dlink.com/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
D-Link | DI-7003GV2 |
Version: 24.04.18D1 R(68125) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4753", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-16T15:34:31.463766Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-16T15:34:43.096Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "DI-7003GV2", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "24.04.18D1 R(68125)" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "153528990 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. Affected by this issue is some unknown functionality of the file /login.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine Schwachstelle wurde in D-Link DI-7003GV2 24.04.18D1 R(68125) gefunden. Sie wurde als problematisch eingestuft. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Datei /login.data. Dank der Manipulation mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Information Disclosure", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-16T06:31:05.439Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-309056 | D-Link DI-7003GV2 login.data information disclosure", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.309056" }, { "name": "VDB-309056 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.309056" }, { "name": "Submit #571072 | D-Link DI-7003GV2 24.04.18D1 R(68125) Exposure of Sensitive System Information to an Unauthorized Cont", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.571072" }, { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/login.md" }, { "tags": [ "product" ], "url": "https://www.dlink.com/" } ], "timeline": [ { "lang": "en", "time": "2025-05-15T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-15T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-15T11:08:26.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DI-7003GV2 login.data information disclosure" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4753", "datePublished": "2025-05-16T06:31:05.439Z", "dateReserved": "2025-05-15T09:03:09.303Z", "dateUpdated": "2025-05-16T15:34:43.096Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4752 (GCVE-0-2025-4752)
Vulnerability from cvelistv5
Published
2025-05-16 06:00
Modified
2025-05-16 15:41
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
VLAI Severity ?
EPSS score ?
Summary
A vulnerability has been found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /install_base.data. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.309055 | vdb-entry | |
https://vuldb.com/?ctiid.309055 | signature, permissions-required | |
https://vuldb.com/?submit.571071 | third-party-advisory | |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/install_base.md | exploit | |
https://www.dlink.com/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
D-Link | DI-7003GV2 |
Version: 24.04.18D1 R(68125) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4752", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-16T15:41:26.590223Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-16T15:41:38.322Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "DI-7003GV2", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "24.04.18D1 R(68125)" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "153528990 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /install_base.data. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In D-Link DI-7003GV2 24.04.18D1 R(68125) wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei /install_base.data. Durch Beeinflussen mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Information Disclosure", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-16T06:00:08.748Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-309055 | D-Link DI-7003GV2 install_base.data information disclosure", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.309055" }, { "name": "VDB-309055 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.309055" }, { "name": "Submit #571071 | D-Link DI-7003GV2 24.04.18D1 R(68125) Information Disclosure", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.571071" }, { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/install_base.md" }, { "tags": [ "product" ], "url": "https://www.dlink.com/" } ], "timeline": [ { "lang": "en", "time": "2025-05-15T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-15T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-15T11:08:25.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DI-7003GV2 install_base.data information disclosure" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4752", "datePublished": "2025-05-16T06:00:08.748Z", "dateReserved": "2025-05-15T09:03:06.643Z", "dateUpdated": "2025-05-16T15:41:38.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4750 (GCVE-0-2025-4750)
Vulnerability from cvelistv5
Published
2025-05-16 05:31
Modified
2025-05-16 15:54
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
VLAI Severity ?
EPSS score ?
Summary
A vulnerability, which was classified as problematic, has been found in D-Link DI-7003GV2 24.04.18D1 R(68125). This issue affects some unknown processing of the file /H5/get_version.data of the component Configuration Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.309053 | vdb-entry | |
https://vuldb.com/?ctiid.309053 | signature, permissions-required | |
https://vuldb.com/?submit.571069 | third-party-advisory | |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/get_version.md | exploit | |
https://www.dlink.com/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
D-Link | DI-7003GV2 |
Version: 24.04.18D1 R(68125) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4750", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-16T15:54:01.999640Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-16T15:54:14.234Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "Configuration Handler" ], "product": "DI-7003GV2", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "24.04.18D1 R(68125)" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "153528990 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in D-Link DI-7003GV2 24.04.18D1 R(68125). This issue affects some unknown processing of the file /H5/get_version.data of the component Configuration Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine Schwachstelle wurde in D-Link DI-7003GV2 24.04.18D1 R(68125) entdeckt. Sie wurde als problematisch eingestuft. Betroffen davon ist ein unbekannter Prozess der Datei /H5/get_version.data der Komponente Configuration Handler. Durch Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Information Disclosure", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-16T05:31:04.590Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-309053 | D-Link DI-7003GV2 Configuration get_version.data information disclosure", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.309053" }, { "name": "VDB-309053 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.309053" }, { "name": "Submit #571069 | D-Link DI-7003GV2 24.04.18D1 R(68125) Improper Access Controls", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.571069" }, { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/get_version.md" }, { "tags": [ "product" ], "url": "https://www.dlink.com/" } ], "timeline": [ { "lang": "en", "time": "2025-05-15T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-15T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-15T11:08:22.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DI-7003GV2 Configuration get_version.data information disclosure" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4750", "datePublished": "2025-05-16T05:31:04.590Z", "dateReserved": "2025-05-15T09:03:01.687Z", "dateUpdated": "2025-05-16T15:54:14.234Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4902 (GCVE-0-2025-4902)
Vulnerability from cvelistv5
Published
2025-05-19 00:00
Modified
2025-05-19 14:00
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
VLAI Severity ?
EPSS score ?
Summary
A vulnerability, which was classified as problematic, has been found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected by this issue is the function sub_48F4F0 of the file /H5/versionupdate.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.309458 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.309458 | signature, permissions-required | |
https://vuldb.com/?submit.578050 | third-party-advisory | |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/versionupdate.md | exploit, patch | |
https://www.dlink.com/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
D-Link | DI-7003GV2 |
Version: 24.04.18D1 R(68125) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4902", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-19T14:00:08.954976Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-19T14:00:13.845Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/versionupdate.md" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "DI-7003GV2", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "24.04.18D1 R(68125)" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "153528990 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected by this issue is the function sub_48F4F0 of the file /H5/versionupdate.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine problematische Schwachstelle wurde in D-Link DI-7003GV2 24.04.18D1 R(68125) entdeckt. Betroffen davon ist die Funktion sub_48F4F0 der Datei /H5/versionupdate.data. Mittels Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Information Disclosure", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-19T00:00:08.280Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-309458 | D-Link DI-7003GV2 versionupdate.data sub_48F4F0 information disclosure", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.309458" }, { "name": "VDB-309458 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.309458" }, { "name": "Submit #578050 | D-Link DI-7003GV2 24.04.18D1 R(68125) Exposure of Sensitive System Information to an Unauthorized Cont", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578050" }, { "tags": [ "exploit", "patch" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/versionupdate.md" }, { "tags": [ "product" ], "url": "https://www.dlink.com/" } ], "timeline": [ { "lang": "en", "time": "2025-05-17T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-17T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-17T15:11:26.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DI-7003GV2 versionupdate.data sub_48F4F0 information disclosure" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4902", "datePublished": "2025-05-19T00:00:08.280Z", "dateReserved": "2025-05-17T13:06:13.410Z", "dateUpdated": "2025-05-19T14:00:13.845Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4903 (GCVE-0-2025-4903)
Vulnerability from cvelistv5
Published
2025-05-19 00:31
Modified
2025-05-19 15:21
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
VLAI Severity ?
EPSS score ?
Summary
A vulnerability, which was classified as critical, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This affects the function sub_41F4F0 of the file /H5/webgl.asp?tggl_port=0&remote_management=0&http_passwd=game&exec_service=admin-restart. The manipulation leads to unverified password change. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.309459 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.309459 | signature, permissions-required | |
https://vuldb.com/?submit.578051 | third-party-advisory | |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/webgl_asp.md | exploit | |
https://www.dlink.com/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
D-Link | DI-7003GV2 |
Version: 24.04.18D1 R(68125) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4903", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-19T14:51:21.159992Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-19T15:21:59.622Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "DI-7003GV2", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "24.04.18D1 R(68125)" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "153528990 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This affects the function sub_41F4F0 of the file /H5/webgl.asp?tggl_port=0\u0026remote_management=0\u0026http_passwd=game\u0026exec_service=admin-restart. The manipulation leads to unverified password change. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine kritische Schwachstelle in D-Link DI-7003GV2 24.04.18D1 R(68125) gefunden. Betroffen hiervon ist die Funktion sub_41F4F0 der Datei /H5/webgl.asp?tggl_port=0\u0026remote_management=0\u0026http_passwd=game\u0026exec_service=admin-restart. Durch das Manipulieren mit unbekannten Daten kann eine unverified password change-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-620", "description": "Unverified Password Change", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-640", "description": "Weak Password Recovery", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-19T00:31:04.582Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-309459 | D-Link DI-7003GV2 webgl.asp sub_41F4F0 unverified password change", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.309459" }, { "name": "VDB-309459 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.309459" }, { "name": "Submit #578051 | D-Link DI-7003GV2 24.04.18D1 R(68125) Improper Access Controls", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578051" }, { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/webgl_asp.md" }, { "tags": [ "product" ], "url": "https://www.dlink.com/" } ], "timeline": [ { "lang": "en", "time": "2025-05-17T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-17T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-17T15:11:27.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DI-7003GV2 webgl.asp sub_41F4F0 unverified password change" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4903", "datePublished": "2025-05-19T00:31:04.582Z", "dateReserved": "2025-05-17T13:06:16.188Z", "dateUpdated": "2025-05-19T15:21:59.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4904 (GCVE-0-2025-4904)
Vulnerability from cvelistv5
Published
2025-05-19 01:00
Modified
2025-05-19 15:21
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
VLAI Severity ?
EPSS score ?
Summary
A vulnerability has been found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. This vulnerability affects the function sub_41F0FC of the file /H5/webgl.data. The manipulation leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.309460 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.309460 | signature, permissions-required | |
https://vuldb.com/?submit.578052 | third-party-advisory | |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/webgl_data.md | exploit | |
https://www.dlink.com/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
D-Link | DI-7003GV2 |
Version: 24.04.18D1 R(68125) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4904", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-19T14:51:06.231952Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-19T15:21:54.142Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "DI-7003GV2", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "24.04.18D1 R(68125)" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "153528990 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. This vulnerability affects the function sub_41F0FC of the file /H5/webgl.data. The manipulation leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In D-Link DI-7003GV2 24.04.18D1 R(68125) wurde eine problematische Schwachstelle gefunden. Es geht um die Funktion sub_41F0FC der Datei /H5/webgl.data. Durch Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Information Disclosure", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-19T01:00:07.639Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-309460 | D-Link DI-7003GV2 webgl.data sub_41F0FC information disclosure", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.309460" }, { "name": "VDB-309460 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.309460" }, { "name": "Submit #578052 | D-Link DI-7003GV2 24.04.18D1 R(68125) Exposure of Sensitive System Information to an Unauthorized Cont", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578052" }, { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/webgl_data.md" }, { "tags": [ "product" ], "url": "https://www.dlink.com/" } ], "timeline": [ { "lang": "en", "time": "2025-05-17T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-17T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-17T15:11:28.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DI-7003GV2 webgl.data sub_41F0FC information disclosure" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4904", "datePublished": "2025-05-19T01:00:07.639Z", "dateReserved": "2025-05-17T13:06:18.586Z", "dateUpdated": "2025-05-19T15:21:54.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4756 (GCVE-0-2025-4756)
Vulnerability from cvelistv5
Published
2025-05-16 07:31
Modified
2025-05-16 15:53
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-404 - Denial of Service
Summary
A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125). It has been declared as problematic. This vulnerability affects unknown code of the file /H5/restart.asp. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.309058 | vdb-entry | |
https://vuldb.com/?ctiid.309058 | signature, permissions-required | |
https://vuldb.com/?submit.571077 | third-party-advisory | |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/restart.md | exploit | |
https://www.dlink.com/ | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
D-Link | DI-7003GV2 |
Version: 24.04.18D1 R(68125) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4756", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-16T15:52:55.825211Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-16T15:53:04.233Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "DI-7003GV2", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "24.04.18D1 R(68125)" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "153528990 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125). It has been declared as problematic. This vulnerability affects unknown code of the file /H5/restart.asp. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In D-Link DI-7003GV2 24.04.18D1 R(68125) wurde eine Schwachstelle ausgemacht. Sie wurde als problematisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /H5/restart.asp. Mit der Manipulation mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "Denial of Service", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-16T07:31:05.830Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-309058 | D-Link DI-7003GV2 restart.asp denial of service", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.309058" }, { "name": "VDB-309058 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.309058" }, { "name": "Submit #571077 | D-Link DI-7003GV2 24.04.18D1 R(68125) Improper Authorization", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.571077" }, { "tags": [ "exploit" ], "url": "https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/restart.md" }, { "tags": [ "product" ], "url": "https://www.dlink.com/" } ], "timeline": [ { "lang": "en", "time": "2025-05-15T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-15T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-15T11:08:28.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DI-7003GV2 restart.asp denial of service" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4756", "datePublished": "2025-05-16T07:31:05.830Z", "dateReserved": "2025-05-15T09:03:14.927Z", "dateUpdated": "2025-05-16T15:53:04.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }