Vulnerability Description
A weakness has been identified in D-Link DAP-2695 2.00RC13. The affected element is the function sub_40C6B8 of the component Firmware Update Handler. Executing manipulation can lead to improper verification of cryptographic signature. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dap-2695 Firmware | 2.00 |
| Dlink | Dap-2695 | - |
Related Weaknesses (CWE)
References
- https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Dlink/DAP-2695_Inte.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.329963Permissions RequiredVDB Entry
- https://vuldb.com/?id.329963Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.675854Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2025-12295?
CVE-2025-12295 is a vulnerability with a CVSS score of 6.6 (MEDIUM). A weakness has been identified in D-Link DAP-2695 2.00RC13. The affected element is the function sub_40C6B8 of the component Firmware Update Handler. Executing manipulation can lead to improper verifi...
How severe is CVE-2025-12295?
CVE-2025-12295 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-12295?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dap-2695 Firmware, Dlink Dap-2695.