CVE-2025-4859: Cross Site Scripting in D-Link DAP-2695
A vulnerability was found in D-Link DAP-2695 120b36r137_ALL_en_20210528. It has been rated as problematic. This issue affects some unknown processing of the file /adv_macbypass.php of the component MAC Bypass Settings Page. The manipulation of the argument f_mac leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-4859 is a cross-site scripting (XSS) vulnerability identified in the D-Link DAP-2695 wireless access point, specifically affecting firmware version 120b36r137_ALL_en_20210528. The vulnerability resides in the MAC Bypass Settings Page, particularly in the processing of the 'f_mac' parameter within the /adv_macbypass.php file. An attacker can manipulate this parameter to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without authentication, although it requires user interaction (e.g., the victim visiting a crafted URL or interface). The vulnerability has been publicly disclosed, but no known exploits are currently observed in the wild. Importantly, the affected product is no longer supported by D-Link, meaning no official patches or updates are available to remediate this issue. The CVSS v4.0 base score is 4.8, indicating a medium severity level. The attack vector is network-based with low attack complexity, no privileges required, but user interaction is necessary. The impact primarily affects the integrity of the victim's browsing session, potentially allowing attackers to steal session cookies, perform actions on behalf of the user, or conduct phishing attacks within the device's management interface. Other parameters in the same component may also be vulnerable, suggesting a broader issue with input validation in the MAC Bypass Settings Page. Since the device is an access point, exploitation could lead to compromise of network management interfaces, potentially facilitating further network intrusion or lateral movement if administrative credentials are stolen or sessions hijacked.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on the D-Link DAP-2695 access points in their network infrastructure. Successful exploitation could allow attackers to execute malicious scripts in the context of network administrators or users managing the device, leading to credential theft, unauthorized configuration changes, or network reconnaissance. This could degrade network integrity and availability, potentially disrupting business operations. Since the device is no longer supported, organizations cannot rely on vendor patches, increasing the risk of persistent exposure. Additionally, if attackers leverage this vulnerability as an initial foothold, they may pivot to other critical systems within the network. The requirement for user interaction limits mass exploitation but targeted attacks against network administrators or IT personnel remain a concern. Given the widespread use of D-Link networking equipment in small and medium enterprises across Europe, this vulnerability poses a moderate risk to organizations that have not replaced or isolated these legacy devices.
Mitigation Recommendations
Given the lack of vendor support and absence of patches, European organizations should prioritize the following mitigations: 1) Immediate replacement or segmentation of affected DAP-2695 devices to isolate them from critical network segments and administrative workstations. 2) Restrict access to the device management interface to trusted IP addresses and enforce strong network-level access controls such as VPNs or jump hosts. 3) Disable or restrict the MAC Bypass Settings Page functionality if possible, or disable web management interfaces when not in use. 4) Implement strict input validation and Content Security Policy (CSP) on any custom management portals that interact with these devices, if applicable. 5) Educate network administrators about the risk of phishing or social engineering attacks that could trigger the XSS vulnerability. 6) Monitor network traffic and logs for suspicious activity related to the device management interface. 7) Plan for device lifecycle management to avoid continued use of unsupported hardware with known vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-4859: Cross Site Scripting in D-Link DAP-2695
Description
A vulnerability was found in D-Link DAP-2695 120b36r137_ALL_en_20210528. It has been rated as problematic. This issue affects some unknown processing of the file /adv_macbypass.php of the component MAC Bypass Settings Page. The manipulation of the argument f_mac leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-4859 is a cross-site scripting (XSS) vulnerability identified in the D-Link DAP-2695 wireless access point, specifically affecting firmware version 120b36r137_ALL_en_20210528. The vulnerability resides in the MAC Bypass Settings Page, particularly in the processing of the 'f_mac' parameter within the /adv_macbypass.php file. An attacker can manipulate this parameter to inject malicious scripts that execute in the context of the victim's browser. This vulnerability is remotely exploitable without authentication, although it requires user interaction (e.g., the victim visiting a crafted URL or interface). The vulnerability has been publicly disclosed, but no known exploits are currently observed in the wild. Importantly, the affected product is no longer supported by D-Link, meaning no official patches or updates are available to remediate this issue. The CVSS v4.0 base score is 4.8, indicating a medium severity level. The attack vector is network-based with low attack complexity, no privileges required, but user interaction is necessary. The impact primarily affects the integrity of the victim's browsing session, potentially allowing attackers to steal session cookies, perform actions on behalf of the user, or conduct phishing attacks within the device's management interface. Other parameters in the same component may also be vulnerable, suggesting a broader issue with input validation in the MAC Bypass Settings Page. Since the device is an access point, exploitation could lead to compromise of network management interfaces, potentially facilitating further network intrusion or lateral movement if administrative credentials are stolen or sessions hijacked.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on the D-Link DAP-2695 access points in their network infrastructure. Successful exploitation could allow attackers to execute malicious scripts in the context of network administrators or users managing the device, leading to credential theft, unauthorized configuration changes, or network reconnaissance. This could degrade network integrity and availability, potentially disrupting business operations. Since the device is no longer supported, organizations cannot rely on vendor patches, increasing the risk of persistent exposure. Additionally, if attackers leverage this vulnerability as an initial foothold, they may pivot to other critical systems within the network. The requirement for user interaction limits mass exploitation but targeted attacks against network administrators or IT personnel remain a concern. Given the widespread use of D-Link networking equipment in small and medium enterprises across Europe, this vulnerability poses a moderate risk to organizations that have not replaced or isolated these legacy devices.
Mitigation Recommendations
Given the lack of vendor support and absence of patches, European organizations should prioritize the following mitigations: 1) Immediate replacement or segmentation of affected DAP-2695 devices to isolate them from critical network segments and administrative workstations. 2) Restrict access to the device management interface to trusted IP addresses and enforce strong network-level access controls such as VPNs or jump hosts. 3) Disable or restrict the MAC Bypass Settings Page functionality if possible, or disable web management interfaces when not in use. 4) Implement strict input validation and Content Security Policy (CSP) on any custom management portals that interact with these devices, if applicable. 5) Educate network administrators about the risk of phishing or social engineering attacks that could trigger the XSS vulnerability. 6) Monitor network traffic and logs for suspicious activity related to the device management interface. 7) Plan for device lifecycle management to avoid continued use of unsupported hardware with known vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-16T18:54:48.747Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb798
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 8:03:36 PM
Last updated: 7/31/2025, 5:12:43 AM
Views: 14
Related Threats
CVE-2025-6572: CWE-79 Cross-Site Scripting (XSS) in OpenStreetMap for Gutenberg and WPBakery Page Builder (formerly Visual Composer)
HighCVE-2025-54959: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Mubit co.,ltd. Powered BLUE 870
MediumCVE-2025-54958: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Mubit co.,ltd. Powered BLUE 870
MediumCVE-2025-54940: Code injection in WPEngine, Inc. Advanced Custom Fields
LowCVE-2025-8708: Deserialization in Antabot White-Jotter
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.