Vulnerability Description
A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC.
Related Weaknesses (CWE)
References
- https://github.com/threat9/routersploit/blob/master/routersploit/modules/exploit
- https://vulncheck.com/advisories/dlink-dsl-routers-path-traversal-file-read
- https://www.dlink.com
- https://www.exploit-db.com/exploits/40735
FAQ
What is CVE-2025-34048?
CVE-2025-34048 is a documented vulnerability. A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerabili...
How severe is CVE-2025-34048?
CVSS scoring is not yet available for CVE-2025-34048. Check NVD for updates.
Is there a patch for CVE-2025-34048?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.