Vulnerability Description
A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared as critical. This vulnerability affects the function isUCPCameraNameChanged of the file /sbin/ucp. The manipulation of the argument CameraName leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dcs-932L Firmware | 2.18.01 |
| Dlink | Dcs-932L | - |
Related Weaknesses (CWE)
References
- https://github.com/BeaCox/IoT_vuln/tree/main/D-Link/DCS-932L/ucp_bofExploit
- https://vuldb.com/?ctiid.309310Permissions RequiredVDB Entry
- https://vuldb.com/?id.309310Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.574925Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2025-4842?
CVE-2025-4842 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared as critical. This vulnerability affects the function isUCPCameraNameChanged of the file /sbin/ucp. The manipulation of the ar...
How severe is CVE-2025-4842?
CVE-2025-4842 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-4842?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dcs-932L Firmware, Dlink Dcs-932L.