CVE-2025-10779: Stack-based Buffer Overflow in D-Link DCS-935L
A vulnerability was found in D-Link DCS-935L up to 1.13.01. The impacted element is the function sub_402280 of the file /HNAP1/. The manipulation of the argument HNAP_AUTH/SOAPAction results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-10779 is a high-severity stack-based buffer overflow vulnerability affecting the D-Link DCS-935L IP camera, specifically versions up to 1.13.01. The vulnerability resides in the function sub_402280 within the /HNAP1/ service endpoint, which processes SOAPAction headers related to HNAP_AUTH. Improper handling and validation of these headers allow an attacker to craft a malicious request that triggers a stack-based buffer overflow. This overflow can lead to arbitrary code execution or denial of service on the affected device. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. Although the exploit code has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. Importantly, the affected devices are no longer supported by D-Link, meaning no official patches or firmware updates are available to remediate this issue. This lack of vendor support significantly increases the risk for organizations still operating these devices, as they remain exposed to potential attacks without vendor-provided fixes.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on D-Link DCS-935L cameras for physical security, surveillance, or monitoring. Successful exploitation could allow attackers to gain control over the camera, potentially enabling espionage, unauthorized surveillance, or pivoting into internal networks. The compromise of these devices could lead to breaches of confidentiality, as video feeds and sensitive data may be intercepted or manipulated. Additionally, attackers could disrupt availability by causing device crashes or network outages. Given the remote exploitability and lack of authentication requirements, attackers can launch attacks from anywhere, increasing the threat surface. Organizations in sectors such as critical infrastructure, government, healthcare, and finance that use these cameras may face increased risks of targeted attacks or espionage. The absence of vendor support means organizations must rely on compensating controls, increasing operational complexity and cost.
Mitigation Recommendations
Since no official patches are available due to the end-of-life status of the DCS-935L, European organizations should prioritize the following mitigations: 1) Immediate network segmentation to isolate affected cameras from critical internal networks, limiting lateral movement opportunities. 2) Deploy strict firewall rules to restrict inbound and outbound traffic to and from these devices, allowing only trusted management hosts. 3) Disable or restrict remote access to the cameras, especially blocking access to the /HNAP1/ endpoint if possible. 4) Replace affected devices with supported models that receive regular security updates to eliminate the vulnerability entirely. 5) Implement continuous network monitoring and intrusion detection systems to identify anomalous traffic patterns or exploitation attempts targeting these devices. 6) Conduct regular security audits of IoT and surveillance infrastructure to identify unsupported or vulnerable devices. 7) Educate IT and security teams about the risks associated with legacy IoT devices and the importance of timely decommissioning.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland
CVE-2025-10779: Stack-based Buffer Overflow in D-Link DCS-935L
Description
A vulnerability was found in D-Link DCS-935L up to 1.13.01. The impacted element is the function sub_402280 of the file /HNAP1/. The manipulation of the argument HNAP_AUTH/SOAPAction results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-10779 is a high-severity stack-based buffer overflow vulnerability affecting the D-Link DCS-935L IP camera, specifically versions up to 1.13.01. The vulnerability resides in the function sub_402280 within the /HNAP1/ service endpoint, which processes SOAPAction headers related to HNAP_AUTH. Improper handling and validation of these headers allow an attacker to craft a malicious request that triggers a stack-based buffer overflow. This overflow can lead to arbitrary code execution or denial of service on the affected device. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. Although the exploit code has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. Importantly, the affected devices are no longer supported by D-Link, meaning no official patches or firmware updates are available to remediate this issue. This lack of vendor support significantly increases the risk for organizations still operating these devices, as they remain exposed to potential attacks without vendor-provided fixes.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on D-Link DCS-935L cameras for physical security, surveillance, or monitoring. Successful exploitation could allow attackers to gain control over the camera, potentially enabling espionage, unauthorized surveillance, or pivoting into internal networks. The compromise of these devices could lead to breaches of confidentiality, as video feeds and sensitive data may be intercepted or manipulated. Additionally, attackers could disrupt availability by causing device crashes or network outages. Given the remote exploitability and lack of authentication requirements, attackers can launch attacks from anywhere, increasing the threat surface. Organizations in sectors such as critical infrastructure, government, healthcare, and finance that use these cameras may face increased risks of targeted attacks or espionage. The absence of vendor support means organizations must rely on compensating controls, increasing operational complexity and cost.
Mitigation Recommendations
Since no official patches are available due to the end-of-life status of the DCS-935L, European organizations should prioritize the following mitigations: 1) Immediate network segmentation to isolate affected cameras from critical internal networks, limiting lateral movement opportunities. 2) Deploy strict firewall rules to restrict inbound and outbound traffic to and from these devices, allowing only trusted management hosts. 3) Disable or restrict remote access to the cameras, especially blocking access to the /HNAP1/ endpoint if possible. 4) Replace affected devices with supported models that receive regular security updates to eliminate the vulnerability entirely. 5) Implement continuous network monitoring and intrusion detection systems to identify anomalous traffic patterns or exploitation attempts targeting these devices. 6) Conduct regular security audits of IoT and surveillance infrastructure to identify unsupported or vulnerable devices. 7) Educate IT and security teams about the risks associated with legacy IoT devices and the importance of timely decommissioning.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T08:51:51.536Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d0bf8cb68a0c387d44cdea
Added to database: 9/22/2025, 3:16:28 AM
Last enriched: 9/22/2025, 3:31:27 AM
Last updated: 10/7/2025, 1:14:57 PM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighCVE-2025-40885: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.