{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-2359","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-03-15T22:21:36.582Z","datePublished":"2025-03-17T03:31:06.967Z","dateUpdated":"2025-03-17T13:06:21.206Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-03-17T03:31:06.967Z"},"title":"D-Link DIR-823G DDNS Service HNAP1 SetDDNSSettings improper authorization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-285","lang":"en","description":"Improper Authorization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"D-Link","product":"DIR-823G","versions":[{"version":"1.0.2B05_20181207","status":"affected"}],"modules":["DDNS Service"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in D-Link DIR-823G 1.0.2B05_20181207. Affected is the function SetDDNSSettings of the file /HNAP1/ of the component DDNS Service. The manipulation of the argument SOAPAction leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in D-Link DIR-823G 1.0.2B05_20181207 entdeckt. Hiervon betroffen ist die Funktion SetDDNSSettings der Datei /HNAP1/ der Komponente DDNS Service. Durch Beeinflussen des Arguments SOAPAction mit unbekannten Daten kann eine improper authorization-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-03-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-03-15T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-03-15T23:26:40.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"wxhwxhwxh_mie (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.299826","name":"VDB-299826 | D-Link DIR-823G DDNS Service HNAP1 SetDDNSSettings improper authorization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.299826","name":"VDB-299826 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.513750","name":"Submit #513750 | D-Link DIR-823G V1.0.2B05_20181207 Improper Access Controls","tags":["third-party-advisory"]},{"url":"https://lavender-bicycle-a5a.notion.site/D-Link-DIR-823G-SetDDNSSettings-1ac53a41781f80d98649dd3cbe106e9b?pvs=4","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-17T13:04:59.160008Z","id":"CVE-2025-2359","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-17T13:06:21.206Z"}}]}}