Vulnerability Description
A vulnerability has been found in D-Link DWR-M961 1.1.36 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formStaticDHCP of the component Authorization Interface. The manipulation of the argument Hostname leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.49 is able to address this issue. It is recommended to upgrade the affected component.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dwr-M961 Firmware | 1.1.36 |
| Dlink | Dwr-M961 | - |
Related Weaknesses (CWE)
References
- https://github.com/ZOKEYE/CVE/blob/main/D-link.mdBroken Link
- https://vuldb.com/?ctiid.305608Permissions RequiredVDB Entry
- https://vuldb.com/?id.305608Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.553547Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2025-3785?
CVE-2025-3785 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability has been found in D-Link DWR-M961 1.1.36 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formStaticDHCP of the component Authorization Interface...
How severe is CVE-2025-3785?
CVE-2025-3785 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-3785?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dwr-M961 Firmware, Dlink Dwr-M961.