Home

Description

A vulnerability was detected in D-Link DIR-803 up to 1.04. Impacted is an unknown function of the file /getcfg.php of the component Configuration Handler. The manipulation of the argument AUTHORIZED_GROUP results in information disclosure. The attack may be performed from remote. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-11 | Updated 2025-12-11 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R
MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R
5.0AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:UR

Problem types

Information Disclosure

Improper Access Controls

Product status

1.04
affected

Timeline

2025-12-11:Advisory disclosed
2025-12-11:VulDB entry created
2025-12-11:VulDB entry last update

Credits

jiahui2888 (VulDB User) reporter

References

github.com/...D-Link/vuln-2/DIR-803 Authentication Bypass.md exploit

github.com/...D-Link/vuln-2/DIR-803 Authentication Bypass.md exploit

vuldb.com/?id.335869 (VDB-335869 | D-Link DIR-803 Configuration getcfg.php information disclosure) vdb-entry technical-description

vuldb.com/?ctiid.335869 (VDB-335869 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.703150 (Submit #703150 | D-Link DIR-803 1.04 and earlier Authorization Bypass) third-party-advisory

github.com/...D-Link/vuln-2/DIR-803 Authentication Bypass.md broken-link

github.com/...D-Link/vuln-2/DIR-803 Authentication Bypass.md exploit

www.dlink.com/ product

cve.org (CVE-2025-14528)

nvd.nist.gov (CVE-2025-14528)

Download JSON