D-Link DAP-1325 firmware version 1.01 contains a broken access control vulnerability that allows unauthenticated attackers to download device configuration settings without authentication. Attackers can exploit the /cgi-bin/ExportSettings.sh endpoint to retrieve sensitive configuration information by directly accessing the export settings script.
References
| Link | Resource |
|---|---|
| https://www.dlink.com/hr/hr/products/dap-1325-n300-wifi-range-extender | Product |
| https://www.exploit-db.com/exploits/51556 | Exploit |
| https://www.vulncheck.com/advisories/d-link-dap-hardware-a-unauthenticated-configuration-download | Broken Link Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-16 18:16
Updated : 2025-12-24 17:15
NVD link : CVE-2023-53896
Mitre link : CVE-2023-53896
CVE.ORG link : CVE-2023-53896
JSON object : View
Products Affected
dlink
- dap-1325
- dap-1325_firmware
CWE
CWE-306
Missing Authentication for Critical Function
