CVE-2025-6931
low-risk
Published 2025-06-30
A vulnerability classified as problematic was found in D-Link DCS-6517 and DCS-7517 up to 2.02.0. Affected by this vulnerability is the function generate_pass_from_mac of the file /bin/httpd of the component Root Password Generation Handler. The manipulation leads to insufficient entropy. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Do I need to act?
-
0.11% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.7/10
Low
NETWORK
/ HIGH complexity
Affected Products (2)
Dcs-6517 Firmware
Dcs-7517 Firmware
Affected Vendors
References (10)
Permissions Required
https://vuldb.com/?ctiid.314443
Third Party Advisory
https://vuldb.com/?id.314443
Third Party Advisory
https://vuldb.com/?submit.605592
Third Party Advisory
https://vuldb.com/?submit.605593
Third Party Advisory
https://vuldb.com/?submit.605596
Product
https://www.dlink.com/
20
/ 100
low-risk
Severity
13/34 · Low
Exploitability
0/34 · Minimal
Exposure
7/34 · Low