CVE-2025-10779: Stack-based Buffer Overflow in D-Link DCS-935L
A vulnerability was found in D-Link DCS-935L up to 1.13.01. The impacted element is the function sub_402280 of the file /HNAP1/. The manipulation of the argument HNAP_AUTH/SOAPAction results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-10779 is a high-severity stack-based buffer overflow vulnerability affecting the D-Link DCS-935L IP camera, specifically versions up to 1.13.01. The vulnerability resides in the function sub_402280 within the /HNAP1/ service endpoint, which processes SOAPAction headers related to HNAP_AUTH. Improper handling and validation of these headers allow an attacker to craft a malicious request that triggers a stack-based buffer overflow. This overflow can lead to arbitrary code execution or denial of service on the affected device. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. Although the exploit code has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. Importantly, the affected devices are no longer supported by D-Link, meaning no official patches or firmware updates are available to remediate this issue. This lack of vendor support significantly increases the risk for organizations still operating these devices, as they remain exposed to potential attacks without vendor-provided fixes.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on D-Link DCS-935L cameras for physical security, surveillance, or monitoring. Successful exploitation could allow attackers to gain control over the camera, potentially enabling espionage, unauthorized surveillance, or pivoting into internal networks. The compromise of these devices could lead to breaches of confidentiality, as video feeds and sensitive data may be intercepted or manipulated. Additionally, attackers could disrupt availability by causing device crashes or network outages. Given the remote exploitability and lack of authentication requirements, attackers can launch attacks from anywhere, increasing the threat surface. Organizations in sectors such as critical infrastructure, government, healthcare, and finance that use these cameras may face increased risks of targeted attacks or espionage. The absence of vendor support means organizations must rely on compensating controls, increasing operational complexity and cost.
Mitigation Recommendations
Since no official patches are available due to the end-of-life status of the DCS-935L, European organizations should prioritize the following mitigations: 1) Immediate network segmentation to isolate affected cameras from critical internal networks, limiting lateral movement opportunities. 2) Deploy strict firewall rules to restrict inbound and outbound traffic to and from these devices, allowing only trusted management hosts. 3) Disable or restrict remote access to the cameras, especially blocking access to the /HNAP1/ endpoint if possible. 4) Replace affected devices with supported models that receive regular security updates to eliminate the vulnerability entirely. 5) Implement continuous network monitoring and intrusion detection systems to identify anomalous traffic patterns or exploitation attempts targeting these devices. 6) Conduct regular security audits of IoT and surveillance infrastructure to identify unsupported or vulnerable devices. 7) Educate IT and security teams about the risks associated with legacy IoT devices and the importance of timely decommissioning.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland
CVE-2025-10779: Stack-based Buffer Overflow in D-Link DCS-935L
Description
A vulnerability was found in D-Link DCS-935L up to 1.13.01. The impacted element is the function sub_402280 of the file /HNAP1/. The manipulation of the argument HNAP_AUTH/SOAPAction results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-10779 is a high-severity stack-based buffer overflow vulnerability affecting the D-Link DCS-935L IP camera, specifically versions up to 1.13.01. The vulnerability resides in the function sub_402280 within the /HNAP1/ service endpoint, which processes SOAPAction headers related to HNAP_AUTH. Improper handling and validation of these headers allow an attacker to craft a malicious request that triggers a stack-based buffer overflow. This overflow can lead to arbitrary code execution or denial of service on the affected device. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. Although the exploit code has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. Importantly, the affected devices are no longer supported by D-Link, meaning no official patches or firmware updates are available to remediate this issue. This lack of vendor support significantly increases the risk for organizations still operating these devices, as they remain exposed to potential attacks without vendor-provided fixes.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on D-Link DCS-935L cameras for physical security, surveillance, or monitoring. Successful exploitation could allow attackers to gain control over the camera, potentially enabling espionage, unauthorized surveillance, or pivoting into internal networks. The compromise of these devices could lead to breaches of confidentiality, as video feeds and sensitive data may be intercepted or manipulated. Additionally, attackers could disrupt availability by causing device crashes or network outages. Given the remote exploitability and lack of authentication requirements, attackers can launch attacks from anywhere, increasing the threat surface. Organizations in sectors such as critical infrastructure, government, healthcare, and finance that use these cameras may face increased risks of targeted attacks or espionage. The absence of vendor support means organizations must rely on compensating controls, increasing operational complexity and cost.
Mitigation Recommendations
Since no official patches are available due to the end-of-life status of the DCS-935L, European organizations should prioritize the following mitigations: 1) Immediate network segmentation to isolate affected cameras from critical internal networks, limiting lateral movement opportunities. 2) Deploy strict firewall rules to restrict inbound and outbound traffic to and from these devices, allowing only trusted management hosts. 3) Disable or restrict remote access to the cameras, especially blocking access to the /HNAP1/ endpoint if possible. 4) Replace affected devices with supported models that receive regular security updates to eliminate the vulnerability entirely. 5) Implement continuous network monitoring and intrusion detection systems to identify anomalous traffic patterns or exploitation attempts targeting these devices. 6) Conduct regular security audits of IoT and surveillance infrastructure to identify unsupported or vulnerable devices. 7) Educate IT and security teams about the risks associated with legacy IoT devices and the importance of timely decommissioning.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T08:51:51.536Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d0bf8cb68a0c387d44cdea
Added to database: 9/22/2025, 3:16:28 AM
Last enriched: 9/22/2025, 3:31:27 AM
Last updated: 1/7/2026, 4:15:59 AM
Views: 103
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.