CVE-2025-5571

A vulnerability was found in D-Link DCS-932L 2.18.01. It has been classified as critical. Affected is the function setSystemAdmin of the file /setSystemAdmin. The manipulation of the argument AdminID leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_42/42.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.311028 Permissions Required VDB Entry
https://vuldb.com/?id.311028 Third Party Advisory VDB Entry
https://vuldb.com/?submit.588465 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dcs-932l_firmware:2.18.01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dcs-932l:-:*:*:*:*:*:*:*

History

15 Jul 2025, 17:22

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-04 06:15

Updated : 2025-07-15 17:22


NVD link : CVE-2025-5571

Mitre link : CVE-2025-5571

CVE.ORG link : CVE-2025-5571


JSON object : View

Products Affected

dlink

  • dcs-932l_firmware
  • dcs-932l
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')