CVE-2025-6932
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-30

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability, which was classified as problematic, was found in D-Link DCS-7517 up to 2.02.0. This affects the function g_F_n_GenPassForQlync of the file /bin/httpd of the component Qlync Password Generation Handler. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-30
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2025-07-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
dlink dcs-7517_firmware to 2.02.0 (inc)
dlink dcs-7517 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-255
CWE-259 The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the D-Link DCS-7517 device up to version 2.02.0, specifically in the Qlync Password Generation Handler function g_F_n_GenPassForQlync. It involves the use of a hard-coded password, which can be exploited remotely. Although the attack complexity is high and exploitability is difficult, the exploit has been publicly disclosed. The affected products are no longer supported by the maintainer.


How can this vulnerability impact me? :

The vulnerability allows an attacker to remotely exploit the device by leveraging a hard-coded password, potentially gaining unauthorized access. This could compromise the security of the device and any network it is connected to. However, the attack complexity is high and exploitability is difficult, which may limit the likelihood of exploitation.


What immediate steps should I take to mitigate this vulnerability?

Since the vulnerability involves the use of a hard-coded password in D-Link DCS-7517 devices up to version 2.02.0, and these products are no longer supported by the maintainer, immediate mitigation steps include restricting remote access to the affected device, disabling the vulnerable service if possible, and replacing the device with a supported model that does not have this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart