ID

VAR-202502-1661


CVE

CVE-2025-1392


TITLE

D-Link Systems, Inc.  of  DIR-816  Cross-site scripting vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-009340

DESCRIPTION

A vulnerability has been found in D-Link DIR-816 1.01TO and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/webproc?getpage=html/index.html&var:menu=24gwlan&var:page=24G_basic. The manipulation of the argument SSID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DIR-816 The firmware contains cross-site scripting and code injection vulnerabilities.Information may be obtained and information may be tampered with. D-Link DIR-816 is a wireless router from D-Link of China. D-Link DIR-816 version 1.01TO has a code injection vulnerability. The vulnerability is caused by the incorrect operation of the parameter SSID, which will lead to a cross-site scripting attack. Attackers can use this vulnerability to execute malicious scripts, steal user cookies, or conduct phishing attacks

Trust: 2.16

sources: NVD: CVE-2025-1392 // JVNDB: JVNDB-2025-009340 // CNVD: CNVD-2025-04183

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-04183

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-816scope:eqversion:1.01to

Trust: 1.0

vendor:d linkmodel:dir-816scope: - version: -

Trust: 0.8

vendor:d linkmodel:dir-816scope:eqversion: -

Trust: 0.8

vendor:d linkmodel:dir-816scope:eqversion:dir-816 firmware 1.01to

Trust: 0.8

vendor:d linkmodel:dir-816 1.01toscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-04183 // JVNDB: JVNDB-2025-009340 // NVD: CVE-2025-1392

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-1392
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2025-1392
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-009340
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-04183
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2025-1392
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-009340
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-04183
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-1392
baseSeverity: LOW
baseScore: 3.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.1
impactScore: 1.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-1392
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 2.7
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-009340
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-04183 // JVNDB: JVNDB-2025-009340 // NVD: CVE-2025-1392 // NVD: CVE-2025-1392

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.0

problemtype:CWE-79

Trust: 1.0

problemtype:Cross-site scripting (CWE-79) [ others ]

Trust: 0.8

problemtype: Cross-site scripting (CWE-79) [NVD evaluation ]

Trust: 0.8

problemtype: Code injection (CWE-94) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-009340 // NVD: CVE-2025-1392

EXTERNAL IDS

db:NVDid:CVE-2025-1392

Trust: 3.2

db:VULDBid:296023

Trust: 2.4

db:JVNDBid:JVNDB-2025-009340

Trust: 0.8

db:CNVDid:CNVD-2025-04183

Trust: 0.6

sources: CNVD: CNVD-2025-04183 // JVNDB: JVNDB-2025-009340 // NVD: CVE-2025-1392

REFERENCES

url:https://vuldb.com/?id.296023

Trust: 2.4

url:https://vuldb.com/?submit.501351

Trust: 2.4

url:https://www.dlink.com/

Trust: 2.4

url:https://vuldb.com/?ctiid.296023

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2025-1392

Trust: 0.8

sources: CNVD: CNVD-2025-04183 // JVNDB: JVNDB-2025-009340 // NVD: CVE-2025-1392

SOURCES

db:CNVDid:CNVD-2025-04183
db:JVNDBid:JVNDB-2025-009340
db:NVDid:CVE-2025-1392

LAST UPDATE DATE

2025-07-22T19:35:17.925000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-04183date:2025-03-04T00:00:00
db:JVNDBid:JVNDB-2025-009340date:2025-07-18T08:39:00
db:NVDid:CVE-2025-1392date:2025-07-16T14:26:19.947

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-04183date:2025-02-27T00:00:00
db:JVNDBid:JVNDB-2025-009340date:2025-07-18T00:00:00
db:NVDid:CVE-2025-1392date:2025-02-17T16:15:16.120