ID

VAR-202510-0440


CVE

CVE-2025-11665


TITLE

D-Link DAP-2695 Operating System Command Injection Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-24396

DESCRIPTION

A vulnerability was detected in D-Link DAP-2695 2.00RC131. This affects the function fwupdater_main of the file rgbin of the component Firmware Update Handler. Performing manipulation results in os command injection. The attack may be initiated remotely. This vulnerability only affects products that are no longer supported by the maintainer. The D-Link DAP-2695 is a high-performance dual-band wireless access point from D-Link (China). An attacker could exploit this vulnerability to execute arbitrary commands

Trust: 1.44

sources: NVD: CVE-2025-11665 // CNVD: CNVD-2025-24396

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-24396

AFFECTED PRODUCTS

vendor:dlinkmodel:dap-2695scope:eqversion:2.00

Trust: 1.0

vendor:d linkmodel:dap-2695 2.00rc131scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-24396 // NVD: CVE-2025-11665

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-11665
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2025-11665
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2025-24396
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2025-11665
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:L/AU:M/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-24396
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-11665
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 1.2
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-11665
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-24396 // NVD: CVE-2025-11665 // NVD: CVE-2025-11665

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-77

Trust: 1.0

sources: NVD: CVE-2025-11665

EXTERNAL IDS

db:NVDid:CVE-2025-11665

Trust: 1.6

db:VULDBid:328084

Trust: 1.0

db:CNVDid:CNVD-2025-24396

Trust: 0.6

sources: CNVD: CNVD-2025-24396 // NVD: CVE-2025-11665

REFERENCES

url:https://vuldb.com/?ctiid.328084

Trust: 1.0

url:https://github.com/iotres/iot_firmware_update/blob/main/dlink/dap-2695.md

Trust: 1.0

url:https://vuldb.com/?id.328084

Trust: 1.0

url:https://www.dlink.com/

Trust: 1.0

url:https://vuldb.com/?submit.673104

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-11665

Trust: 0.6

sources: CNVD: CNVD-2025-24396 // NVD: CVE-2025-11665

SOURCES

db:CNVDid:CNVD-2025-24396
db:NVDid:CVE-2025-11665

LAST UPDATE DATE

2025-11-19T23:22:21.005000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-24396date:2025-10-21T00:00:00
db:NVDid:CVE-2025-11665date:2025-11-03T16:32:20.470

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-24396date:2025-10-21T00:00:00
db:NVDid:CVE-2025-11665date:2025-10-13T07:15:52.023