CVE-2023-53896

D-Link DAP-1325 firmware version 1.01 contains a broken access control vulnerability that allows unauthenticated attackers to download device configuration settings without authentication. Attackers can exploit the /cgi-bin/ExportSettings.sh endpoint to retrieve sensitive configuration information by directly accessing the export settings script.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dap-1325_firmware:1.01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-1325:-:*:*:*:*:*:*:*

History

24 Dec 2025, 17:15

Type Values Removed Values Added
References () https://www.dlink.com/hr/hr/products/dap-1325-n300-wifi-range-extender - () https://www.dlink.com/hr/hr/products/dap-1325-n300-wifi-range-extender - Product
References () https://www.exploit-db.com/exploits/51556 - () https://www.exploit-db.com/exploits/51556 - Exploit
References () https://www.vulncheck.com/advisories/d-link-dap-hardware-a-unauthenticated-configuration-download - () https://www.vulncheck.com/advisories/d-link-dap-hardware-a-unauthenticated-configuration-download - Broken Link, Third Party Advisory
First Time Dlink dap-1325
Dlink
Dlink dap-1325 Firmware
CPE cpe:2.3:o:dlink:dap-1325_firmware:1.01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-1325:-:*:*:*:*:*:*:*

16 Dec 2025, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-16 18:16

Updated : 2025-12-24 17:15


NVD link : CVE-2023-53896

Mitre link : CVE-2023-53896

CVE.ORG link : CVE-2023-53896


JSON object : View

Products Affected

dlink

  • dap-1325
  • dap-1325_firmware
CWE
CWE-306

Missing Authentication for Critical Function