CVE-2025-6931

| EUVD-2025-19592 LOW
2025-06-30 [email protected]
3.7
CVSS 3.1

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 01:25 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 01:25 euvd
EUVD-2025-19592
PoC Detected
Jul 14, 2025 - 17:19 vuln.today
Public exploit code
CVE Published
Jun 30, 2025 - 23:15 nvd
LOW 3.7

Description

A vulnerability classified as problematic was found in D-Link DCS-6517 and DCS-7517 up to 2.02.0. Affected by this vulnerability is the function generate_pass_from_mac of the file /bin/httpd of the component Root Password Generation Handler. The manipulation leads to insufficient entropy. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Analysis

A vulnerability classified as problematic was found in D-Link DCS-6517 and DCS-7517 up to 2.02.0. Affected by this vulnerability is the function generate_pass_from_mac of the file /bin/httpd of the component Root Password Generation Handler. The manipulation leads to insufficient entropy. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Technical Context

This vulnerability is classified as Use of Insufficiently Random Values (CWE-330).

Affected Products

Affected products: Dlink Dcs-6517 Firmware, Dlink Dcs-7517 Firmware

Remediation

Monitor vendor advisories for patches. Apply mitigations such as network segmentation, access restrictions, and monitoring.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +18
POC: +20

Share

CVE-2025-6931 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy