← Back to CVEs
CVE-2025-6932
LOW3.7
Description
A vulnerability, which was classified as problematic, was found in D-Link DCS-7517 up to 2.02.0. This affects the function g_F_n_GenPassForQlync of the file /bin/httpd of the component Qlync Password Generation Handler. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE Details
CVSS v3.1 Score3.7
SeverityLOW
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published6/30/2025
Last Modified7/14/2025
Sourcenvd
Honeypot Sightings0
Affected Products
dlink:dcs-7517dlink:dcs-7517_firmware
Weaknesses (CWE)
CWE-255CWE-259
References
https://vuldb.com/?ctiid.314445(cna@vuldb.com)
https://vuldb.com/?id.314445(cna@vuldb.com)
https://vuldb.com/?submit.605595(cna@vuldb.com)
https://www.dlink.com/(cna@vuldb.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.