Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14225: Command Injection in D-Link DCS-930L

0
Medium
VulnerabilityCVE-2025-14225cvecve-2025-14225
Published: Mon Dec 08 2025 (12/08/2025, 09:02:08 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DCS-930L

Description

A vulnerability was determined in D-Link DCS-930L 1.15.04. This affects an unknown part of the file /setSystemAdmin of the component alphapd. Executing manipulation of the argument AdminID can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 12/08/2025, 09:22:12 UTC

Technical Analysis

CVE-2025-14225 is a command injection vulnerability identified in the D-Link DCS-930L IP camera firmware version 1.15.04. The vulnerability resides in the /setSystemAdmin endpoint of the alphapd component, where the AdminID argument is improperly sanitized, allowing an attacker to inject arbitrary commands. This flaw can be exploited remotely without requiring authentication or user interaction, making it accessible to unauthenticated attackers over the network. The vulnerability affects only this specific firmware version and product, which is no longer supported by D-Link, meaning no official patches or updates are available. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit has been publicly disclosed, increasing the likelihood of exploitation attempts, although no confirmed exploits in the wild have been reported yet. The lack of vendor support and patch availability increases the risk for organizations still operating these devices, especially in environments where these cameras are connected to critical networks or exposed to the internet. The vulnerability could allow attackers to execute arbitrary commands on the device, potentially leading to device takeover, network pivoting, data exfiltration, or denial of service.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for those relying on the D-Link DCS-930L cameras in security or surveillance roles. Successful exploitation could compromise the confidentiality of video feeds, integrity of device configurations, and availability of surveillance services. Attackers could leverage the compromised cameras as footholds to move laterally within internal networks, potentially accessing sensitive systems or data. Since the product is no longer supported, organizations cannot rely on vendor patches, increasing the risk of prolonged exposure. This is especially critical for sectors such as government, critical infrastructure, transportation, and large enterprises where surveillance devices are integral to security operations. The medium CVSS score reflects moderate risk, but the ease of remote exploitation without authentication elevates the threat level. Additionally, the public disclosure of the exploit details may lead to increased scanning and attack attempts targeting vulnerable devices in Europe.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement specific mitigations to reduce risk. First, conduct a thorough inventory to identify all D-Link DCS-930L devices running firmware 1.15.04. Immediately isolate these devices from untrusted networks and restrict access to trusted management networks only. Disable any remote management or internet-facing access to these cameras. Where possible, replace the affected devices with newer, supported models that receive security updates. If replacement is not immediately feasible, consider deploying network segmentation and firewall rules to limit communication to and from these devices. Monitor network traffic for unusual activity originating from these cameras, such as unexpected command execution or outbound connections. Employ intrusion detection systems (IDS) tuned to detect exploitation attempts targeting this vulnerability. Finally, educate security teams about the vulnerability and ensure incident response plans include procedures for compromised IoT devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-07T15:40:47.736Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693698b3b488c525a1d24590

Added to database: 12/8/2025, 9:21:55 AM

Last enriched: 12/8/2025, 9:22:12 AM

Last updated: 12/11/2025, 7:03:59 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats