CVE-2025-4903
moderate-risk
Published 2025-05-19
A vulnerability, which was classified as critical, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This affects the function sub_41F4F0 of the file /H5/webgl.asp?tggl_port=0&remote_management=0&http_passwd=game&exec_service=admin-restart. The manipulation leads to unverified password change. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Do I need to act?
~
1.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (5)
Permissions Required
https://vuldb.com/?ctiid.309459
Third Party Advisory
https://vuldb.com/?id.309459
Third Party Advisory
https://vuldb.com/?submit.578051
Product
https://www.dlink.com/
30
/ 100
moderate-risk
Severity
21/34 · High
Exploitability
4/34 · Minimal
Exposure
5/34 · Minimal