Description
D-Link DAP-1325 firmware version 1.01 contains a broken access control vulnerability that allows unauthenticated attackers to download device configuration settings without authentication. Attackers can exploit the /cgi-bin/ExportSettings.sh endpoint to retrieve sensitive configuration information by directly accessing the export settings script.
Problem types
Missing Authentication for Critical Function
Product status
Credits
ieduardogoncalves
References
www.exploit-db.com/exploits/51556 (ExploitDB-51556)
www.dlink.com/.../products/dap-1325-n300-wifi-range-extender (D-Link DAP-1325 Product Webpage)
www.vulncheck.com/...-unauthenticated-configuration-download (VulnCheck Advisory: D-Link DAP-1325 Hardware A1 Unauthenticated Configuration Download)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.