CVE-2025-15245
Unknown Unknown - Not Provided
Path Traversal in D-Link DCS-850L Firmware Update Service

Publication date: 2025-12-30

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in D-Link DCS-850L 1.02.09. Affected is the function uploadfirmware of the component Firmware Update Service. The manipulation of the argument DownloadFile results in path traversal. The attack must originate from the local network. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
d-link dcs-850l 1.02.09
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Absolute Path Traversal flaw in the D-Link DCS-850L device's Firmware Update Service, specifically in the 'uploadfirmware' function. It occurs because the service improperly handles the 'DownloadFile' argument, allowing an attacker on the local network to manipulate the file path using sequences like '../' to access files outside the intended directory. This means an attacker can read sensitive files on the device by tricking the firmware update process into opening arbitrary files. [1, 2]


How can this vulnerability impact me? :

The vulnerability can compromise the confidentiality of the device by allowing unauthorized access to sensitive system files such as configuration files and password files. This unauthorized file access could facilitate further attacks or information disclosure. Since the affected product is no longer supported and no mitigations exist, the risk is heightened. Exploitation requires local network access, and a public proof-of-concept exploit is available, making it easier for attackers to exploit. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can focus on monitoring network traffic for attempts to exploit the path traversal in the Firmware Update Service's uploadfirmware function, specifically looking for HTTP requests containing path traversal sequences like "../" in the DownloadFile argument. Since the vulnerability requires local network access, inspecting local network traffic for suspicious firmware upload requests with unusual file paths is recommended. However, no specific detection commands or tools are provided in the available resources. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include replacing the affected D-Link DCS-850L device with an alternative product, as the device is no longer supported by the vendor and no known countermeasures or patches exist. Additionally, restricting local network access to the device and monitoring for suspicious firmware upload activity may help reduce risk until replacement is possible. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability compromises confidentiality by enabling unauthorized access to sensitive system files, which could lead to exposure of personal or protected data. Such unauthorized disclosure may result in non-compliance with data protection regulations like GDPR or HIPAA that require safeguarding sensitive information. Since the affected device is no longer supported and no mitigations are available, the risk to compliance is increased unless the device is replaced or properly secured. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart