CVE-2025-11665
BaseFortify
Publication date: 2025-10-13
Last updated on: 2025-11-03
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dlink | dap-2695_firmware | 2.00 |
| dlink | dap-2695 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-11665 is an OS command injection vulnerability in the D-Link DAP-2695 device firmware version 2.00RC131. It occurs in the function fwupdater_main within the rgbin file of the Firmware Update Handler component. The vulnerability arises because user-supplied input is passed to system command execution without proper validation or sanitization, allowing an attacker to inject and execute arbitrary OS commands remotely. Exploitation requires some level of authentication, but no public exploit is currently available. The affected product is no longer supported by the vendor. [2, 3]
How can this vulnerability impact me? :
This vulnerability allows remote attackers to execute arbitrary OS commands on the affected device, potentially compromising its confidentiality, integrity, and availability. This could lead to unauthorized control over the device, disruption of its normal operation, or denial of service. Since the device is no longer supported and no mitigations are available, the risk remains unless the device is replaced. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There are no specific detection commands or network/system detection methods provided for this vulnerability. Since the vulnerability involves OS command injection in the firmware update handler of the D-Link DAP-2695 device, detection would typically require monitoring for unusual command execution or attempts to exploit the firmware update process. However, no public exploit or detection signatures are currently available. [2, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include replacing the affected D-Link DAP-2695 device with an alternative product, as the device is no longer supported by the vendor and no known mitigations or countermeasures exist. Avoid using the vulnerable firmware version 2.00RC131 and restrict remote access to the device to reduce exposure. [2]