ID

VAR-202503-0596


CVE

CVE-2025-2359


TITLE

D-Link Systems, Inc.  of  DIR-823G  Vulnerability regarding improper permission settings in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-009050

DESCRIPTION

A vulnerability classified as critical has been found in D-Link DIR-823G 1.0.2B05_20181207. Affected is the function SetDDNSSettings of the file /HNAP1/ of the component DDNS Service. The manipulation of the argument SOAPAction leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. D-Link Systems, Inc. of DIR-823G The firmware contains vulnerabilities related to improper permission settings and authorization vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-823G is a wireless router from D-Link, a Chinese company. No detailed vulnerability details are provided at present

Trust: 2.16

sources: NVD: CVE-2025-2359 // JVNDB: JVNDB-2025-009050 // CNVD: CNVD-2025-13069

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-13069

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-823gscope:eqversion:1.0.2b05_20181207

Trust: 1.0

vendor:d linkmodel:dir-823gscope:eqversion: -

Trust: 0.8

vendor:d linkmodel:dir-823gscope: - version: -

Trust: 0.8

vendor:d linkmodel:dir-823gscope:eqversion:dir-823g firmware 1.0.2b05 20181207

Trust: 0.8

vendor:d linkmodel:dir-823g 1.0.2b05 20181207scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-13069 // JVNDB: JVNDB-2025-009050 // NVD: CVE-2025-2359

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-2359
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2025-2359
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2025-009050
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-13069
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-2359
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-009050
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-13069
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-2359
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-2359
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-009050
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-13069 // JVNDB: JVNDB-2025-009050 // NVD: CVE-2025-2359 // NVD: CVE-2025-2359

PROBLEMTYPE DATA

problemtype:CWE-266

Trust: 1.0

problemtype:CWE-285

Trust: 1.0

problemtype:Improper permission settings (CWE-266) [ others ]

Trust: 0.8

problemtype: Inappropriate authorization (CWE-285) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-009050 // NVD: CVE-2025-2359

EXTERNAL IDS

db:NVDid:CVE-2025-2359

Trust: 3.2

db:VULDBid:299826

Trust: 1.8

db:JVNDBid:JVNDB-2025-009050

Trust: 0.8

db:CNVDid:CNVD-2025-13069

Trust: 0.6

sources: CNVD: CNVD-2025-13069 // JVNDB: JVNDB-2025-009050 // NVD: CVE-2025-2359

REFERENCES

url:https://lavender-bicycle-a5a.notion.site/d-link-dir-823g-setddnssettings-1ac53a41781f80d98649dd3cbe106e9b?pvs=4

Trust: 2.4

url:https://vuldb.com/?id.299826

Trust: 1.8

url:https://vuldb.com/?submit.513750

Trust: 1.8

url:https://www.dlink.com/

Trust: 1.8

url:https://vuldb.com/?ctiid.299826

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-2359

Trust: 0.8

sources: CNVD: CNVD-2025-13069 // JVNDB: JVNDB-2025-009050 // NVD: CVE-2025-2359

SOURCES

db:CNVDid:CNVD-2025-13069
db:JVNDBid:JVNDB-2025-009050
db:NVDid:CVE-2025-2359

LAST UPDATE DATE

2025-07-18T23:28:50.920000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-13069date:2025-06-20T00:00:00
db:JVNDBid:JVNDB-2025-009050date:2025-07-16T08:28:00
db:NVDid:CVE-2025-2359date:2025-07-15T16:52:21.797

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-13069date:2025-06-20T00:00:00
db:JVNDBid:JVNDB-2025-009050date:2025-07-16T00:00:00
db:NVDid:CVE-2025-2359date:2025-03-17T04:15:11.320