CVE-2025-12295

A weakness has been identified in D-Link DAP-2695 2.00RC13. The affected element is the function sub_40C6B8 of the component Firmware Update Handler. Executing manipulation can lead to improper verification of cryptographic signature. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Dlink/DAP-2695_Inte.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.329963 Permissions Required VDB Entry
https://vuldb.com/?id.329963 Third Party Advisory VDB Entry
https://vuldb.com/?submit.675854 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dap-2695_firmware:2.00:rc131:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-2695:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-10-27 17:15

Updated : 2025-11-03 17:24


NVD link : CVE-2025-12295

Mitre link : CVE-2025-12295

CVE.ORG link : CVE-2025-12295


JSON object : View

Products Affected

dlink

  • dap-2695_firmware
  • dap-2695
CWE
CWE-345

Insufficient Verification of Data Authenticity

CWE-347

Improper Verification of Cryptographic Signature