CVE-2025-4859
low-risk
Published 2025-05-18
A vulnerability was found in D-Link DAP-2695 120b36r137_ALL_en_20210528. It has been rated as problematic. This issue affects some unknown processing of the file /adv_macbypass.php of the component MAC Bypass Settings Page. The manipulation of the argument f_mac leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer.
Do I need to act?
-
0.24% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.4/10
Low
NETWORK
/ LOW complexity
Affected Products (1)
Dap-2695 Firmware
Affected Vendors
References (6)
Permissions Required
https://vuldb.com/?ctiid.309401
Third Party Advisory
https://vuldb.com/?id.309401
Third Party Advisory
https://vuldb.com/?submit.575101
Product
https://www.dlink.com/
19
/ 100
low-risk
Severity
13/34 · Low
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal