{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15245","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-29T08:23:02.358Z","datePublished":"2025-12-30T11:02:16.676Z","dateUpdated":"2025-12-30T12:57:33.830Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-30T11:02:16.676Z"},"title":"D-Link DCS-850L Firmware Update Service uploadfirmware path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"D-Link","product":"DCS-850L","versions":[{"version":"1.02.09","status":"affected"}],"modules":["Firmware Update Service"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in D-Link DCS-850L 1.02.09. Affected is the function uploadfirmware of the component Firmware Update Service. The manipulation of the argument DownloadFile results in path traversal. The attack must originate from the local network. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.7,"vectorString":"AV:A/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-29T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-29T09:28:11.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"tian (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.338635","name":"VDB-338635 | D-Link DCS-850L Firmware Update Service uploadfirmware path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.338635","name":"VDB-338635 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.725742","name":"Submit #725742 | D-Link DCS850L v1.02.09 Absolute Path Traversal","tags":["third-party-advisory"]},{"url":"https://tzh00203.notion.site/D-Link-DCS850L-v1-02-09-Path-Traversal-Vulnerability-in-Firmware-Update-2d8b5c52018a803abbc7e30e2858d084?source=copy_link","tags":["exploit","patch"]},{"url":"https://www.dlink.com/","tags":["broken-link","product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-30T12:57:00.711906Z","id":"CVE-2025-15245","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-30T12:57:33.830Z"}}]}}