CVE-2025-29165: n/a
An issue in D-Link DIR-1253 MESH V1.6.1684 allows an attacker to escalate privileges via the etc/shadow.sample component
AI Analysis
Technical Summary
This vulnerability affects the D-Link DIR-1253 MESH router firmware version 1.6.1684. An attacker can exploit an issue related to the etc/shadow.sample component to escalate privileges, potentially gaining unauthorized administrative access. The CVSS 3.1 base score of 9.8 reflects a network attack vector with low complexity, no privileges required, and no user interaction needed, resulting in high impact on confidentiality, integrity, and availability. No official patch or vendor advisory is currently available to confirm remediation status.
Potential Impact
Successful exploitation can lead to complete system compromise, including unauthorized administrative access and control over the affected device. This can result in full disclosure of sensitive information, modification or deletion of data, and disruption of device availability. Given the critical CVSS score, the impact is severe.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict network access to the affected device and monitor for suspicious activity related to privilege escalation attempts. Avoid exposing the device to untrusted networks.
CVE-2025-29165: n/a
Description
An issue in D-Link DIR-1253 MESH V1.6.1684 allows an attacker to escalate privileges via the etc/shadow.sample component
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability affects the D-Link DIR-1253 MESH router firmware version 1.6.1684. An attacker can exploit an issue related to the etc/shadow.sample component to escalate privileges, potentially gaining unauthorized administrative access. The CVSS 3.1 base score of 9.8 reflects a network attack vector with low complexity, no privileges required, and no user interaction needed, resulting in high impact on confidentiality, integrity, and availability. No official patch or vendor advisory is currently available to confirm remediation status.
Potential Impact
Successful exploitation can lead to complete system compromise, including unauthorized administrative access and control over the affected device. This can result in full disclosure of sensitive information, modification or deletion of data, and disruption of device availability. Given the critical CVSS score, the impact is severe.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict network access to the affected device and monitor for suspicious activity related to privilege escalation attempts. Avoid exposing the device to untrusted networks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-03-11T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69a9e2f561e8e69ef5e92409
Added to database: 3/5/2026, 8:09:25 PM
Last enriched: 4/10/2026, 5:28:08 AM
Last updated: 4/19/2026, 6:04:05 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.