Skip to main content

CVE-2025-4859: Cross Site Scripting in D-Link DAP-2695

Medium
VulnerabilityCVE-2025-4859cvecve-2025-4859
Published: Sun May 18 2025 (05/18/2025, 04:31:04 UTC)
Source: CVE
Vendor/Project: D-Link
Product: DAP-2695

Description

A vulnerability was found in D-Link DAP-2695 120b36r137_ALL_en_20210528. It has been rated as problematic. This issue affects some unknown processing of the file /adv_macbypass.php of the component MAC Bypass Settings Page. The manipulation of the argument f_mac leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 07/11/2025, 20:03:36 UTC

Technical Analysis

CVE-2025-4859 is a cross-site scripting (XSS) vulnerability identified in the D-Link DAP-2695 wireless access point, specifically affecting firmware version 120b36r137_ALL_en_20210528. The vulnerability resides in the MAC Bypass Settings Page, particularly in the processing of the 'f_mac' parameter within the /adv_macbypass.php file. An attacker can manipulate this parameter to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without authentication, although it requires user interaction (e.g., the victim visiting a crafted URL or interface). The vulnerability has been publicly disclosed, but no known exploits are currently observed in the wild. Importantly, the affected product is no longer supported by D-Link, meaning no official patches or updates are available to remediate this issue. The CVSS v4.0 base score is 4.8, indicating a medium severity level. The attack vector is network-based with low attack complexity, no privileges required, but user interaction is necessary. The impact primarily affects the integrity of the victim's browsing session, potentially allowing attackers to steal session cookies, perform actions on behalf of the user, or conduct phishing attacks within the device's management interface. Other parameters in the same component may also be vulnerable, suggesting a broader issue with input validation in the MAC Bypass Settings Page. Since the device is an access point, exploitation could lead to compromise of network management interfaces, potentially facilitating further network intrusion or lateral movement if administrative credentials are stolen or sessions hijacked.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on the D-Link DAP-2695 access points in their network infrastructure. Successful exploitation could allow attackers to execute malicious scripts in the context of network administrators or users managing the device, leading to credential theft, unauthorized configuration changes, or network reconnaissance. This could degrade network integrity and availability, potentially disrupting business operations. Since the device is no longer supported, organizations cannot rely on vendor patches, increasing the risk of persistent exposure. Additionally, if attackers leverage this vulnerability as an initial foothold, they may pivot to other critical systems within the network. The requirement for user interaction limits mass exploitation but targeted attacks against network administrators or IT personnel remain a concern. Given the widespread use of D-Link networking equipment in small and medium enterprises across Europe, this vulnerability poses a moderate risk to organizations that have not replaced or isolated these legacy devices.

Mitigation Recommendations

Given the lack of vendor support and absence of patches, European organizations should prioritize the following mitigations: 1) Immediate replacement or segmentation of affected DAP-2695 devices to isolate them from critical network segments and administrative workstations. 2) Restrict access to the device management interface to trusted IP addresses and enforce strong network-level access controls such as VPNs or jump hosts. 3) Disable or restrict the MAC Bypass Settings Page functionality if possible, or disable web management interfaces when not in use. 4) Implement strict input validation and Content Security Policy (CSP) on any custom management portals that interact with these devices, if applicable. 5) Educate network administrators about the risk of phishing or social engineering attacks that could trigger the XSS vulnerability. 6) Monitor network traffic and logs for suspicious activity related to the device management interface. 7) Plan for device lifecycle management to avoid continued use of unsupported hardware with known vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-16T18:54:48.747Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb798

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 8:03:36 PM

Last updated: 7/31/2025, 5:12:43 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats