Vulnerability Description
A vulnerability was found in D-Link DCS-932L 2.18.01. It has been classified as critical. Affected is the function setSystemAdmin of the file /setSystemAdmin. The manipulation of the argument AdminID leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dcs-932L Firmware | 2.18.01 |
| Dlink | Dcs-932L | - |
Related Weaknesses (CWE)
References
- https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_42/42.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.311028Permissions RequiredVDB Entry
- https://vuldb.com/?id.311028Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.588465Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2025-5571?
CVE-2025-5571 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was found in D-Link DCS-932L 2.18.01. It has been classified as critical. Affected is the function setSystemAdmin of the file /setSystemAdmin. The manipulation of the argument AdminID ...
How severe is CVE-2025-5571?
CVE-2025-5571 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-5571?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dcs-932L Firmware, Dlink Dcs-932L.