Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10779: Stack-based Buffer Overflow in D-Link DCS-935L

0
High
VulnerabilityCVE-2025-10779cvecve-2025-10779
Published: Mon Sep 22 2025 (09/22/2025, 03:02:07 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DCS-935L

Description

A vulnerability was found in D-Link DCS-935L up to 1.13.01. The impacted element is the function sub_402280 of the file /HNAP1/. The manipulation of the argument HNAP_AUTH/SOAPAction results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 09/22/2025, 03:31:27 UTC

Technical Analysis

CVE-2025-10779 is a high-severity stack-based buffer overflow vulnerability affecting the D-Link DCS-935L IP camera, specifically versions up to 1.13.01. The vulnerability resides in the function sub_402280 within the /HNAP1/ service endpoint, which processes SOAPAction headers related to HNAP_AUTH. Improper handling and validation of these headers allow an attacker to craft a malicious request that triggers a stack-based buffer overflow. This overflow can lead to arbitrary code execution or denial of service on the affected device. The vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. Although the exploit code has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. Importantly, the affected devices are no longer supported by D-Link, meaning no official patches or firmware updates are available to remediate this issue. This lack of vendor support significantly increases the risk for organizations still operating these devices, as they remain exposed to potential attacks without vendor-provided fixes.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on D-Link DCS-935L cameras for physical security, surveillance, or monitoring. Successful exploitation could allow attackers to gain control over the camera, potentially enabling espionage, unauthorized surveillance, or pivoting into internal networks. The compromise of these devices could lead to breaches of confidentiality, as video feeds and sensitive data may be intercepted or manipulated. Additionally, attackers could disrupt availability by causing device crashes or network outages. Given the remote exploitability and lack of authentication requirements, attackers can launch attacks from anywhere, increasing the threat surface. Organizations in sectors such as critical infrastructure, government, healthcare, and finance that use these cameras may face increased risks of targeted attacks or espionage. The absence of vendor support means organizations must rely on compensating controls, increasing operational complexity and cost.

Mitigation Recommendations

Since no official patches are available due to the end-of-life status of the DCS-935L, European organizations should prioritize the following mitigations: 1) Immediate network segmentation to isolate affected cameras from critical internal networks, limiting lateral movement opportunities. 2) Deploy strict firewall rules to restrict inbound and outbound traffic to and from these devices, allowing only trusted management hosts. 3) Disable or restrict remote access to the cameras, especially blocking access to the /HNAP1/ endpoint if possible. 4) Replace affected devices with supported models that receive regular security updates to eliminate the vulnerability entirely. 5) Implement continuous network monitoring and intrusion detection systems to identify anomalous traffic patterns or exploitation attempts targeting these devices. 6) Conduct regular security audits of IoT and surveillance infrastructure to identify unsupported or vulnerable devices. 7) Educate IT and security teams about the risks associated with legacy IoT devices and the importance of timely decommissioning.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-21T08:51:51.536Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d0bf8cb68a0c387d44cdea

Added to database: 9/22/2025, 3:16:28 AM

Last enriched: 9/22/2025, 3:31:27 AM

Last updated: 10/7/2025, 1:14:57 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats