CVE-2025-12295
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-27

Last updated on: 2025-11-03

Assigner: VulDB

Description
A weakness has been identified in D-Link DAP-2695 2.00RC13. The affected element is the function sub_40C6B8 of the component Firmware Update Handler. Executing manipulation can lead to improper verification of cryptographic signature. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-27
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-10-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
dlink dap-2695_firmware 2.00
dlink dap-2695 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
CWE-347 The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the D-Link DAP-2695 device firmware update process, specifically in the Firmware Update Handler's function sub_40C6B8. It involves improper verification of cryptographic signatures during firmware updates, allowing attackers to bypass signature checks. The flaw includes weak input validation and the use of the MD5 hashing algorithm, which is vulnerable to forgery. Attackers who obtain certain verification values can bypass integrity checks, potentially enabling unauthorized or malicious firmware updates. Exploitation can be done remotely but is complex and requires some authentication. [2, 3]


How can this vulnerability impact me? :

This vulnerability can impact you by compromising the confidentiality, integrity, and availability of the affected device. An attacker could remotely install unauthorized or malicious firmware updates, potentially taking control of the device or disrupting its normal operation. Since the device is no longer supported by the vendor and no mitigations are known, the risk remains unless the device is replaced. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

There are no specific detection commands or network/system detection methods provided for this vulnerability. Since the vulnerability involves improper cryptographic signature verification in the firmware update process of D-Link DAP-2695 devices running firmware 2.00RC13, detection would likely require firmware analysis or monitoring for unauthorized firmware update attempts. However, no explicit commands or detection tools are mentioned in the provided resources. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include replacing the affected D-Link DAP-2695 device with an alternative product, as the device is no longer supported by the vendor and no known mitigations or countermeasures exist. Avoid using the vulnerable firmware version 2.00RC13 and do not perform firmware updates from untrusted sources. Monitoring for unauthorized firmware update attempts may also help, but no direct mitigation or patch is available. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart