CVE-2025-5572

HIGH

D-Link DCS-932L 2.18.01 - Buffer Overflow

Title source: llm
STIX 2.1

Description

A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared as critical. Affected by this vulnerability is the function setSystemEmail of the file /setSystemEmail. The manipulation of the argument EmailSMTPPortNumber leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.311029
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.311029
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.588466
Product product
https://www.dlink.com/

Scores

CVSS v3 8.8
EPSS 0.0122
EPSS Percentile 79.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-119 CWE-121 CWE-787
Status published
Products (1)
dlink/dcs-932l_firmware 2.18.01
Published Jun 04, 2025
Tracked Since Feb 18, 2026