D-Link DAP-1325 firmware version 1.01 contains a broken access control vulnerability that allows unauthenticated attackers to download device configuration settings without authentication. Attackers can exploit the /cgi-bin/ExportSettings.sh endpoint to retrieve sensitive configuration information by directly accessing the export settings script.
References
| Link | Resource |
|---|---|
| https://www.dlink.com/hr/hr/products/dap-1325-n300-wifi-range-extender | Product |
| https://www.exploit-db.com/exploits/51556 | Exploit |
| https://www.vulncheck.com/advisories/d-link-dap-hardware-a-unauthenticated-configuration-download | Broken Link Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
24 Dec 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.dlink.com/hr/hr/products/dap-1325-n300-wifi-range-extender - Product | |
| References | () https://www.exploit-db.com/exploits/51556 - Exploit | |
| References | () https://www.vulncheck.com/advisories/d-link-dap-hardware-a-unauthenticated-configuration-download - Broken Link, Third Party Advisory | |
| First Time |
Dlink dap-1325
Dlink Dlink dap-1325 Firmware |
|
| CPE | cpe:2.3:o:dlink:dap-1325_firmware:1.01:*:*:*:*:*:*:* cpe:2.3:h:dlink:dap-1325:-:*:*:*:*:*:*:* |
16 Dec 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-16 18:16
Updated : 2025-12-24 17:15
NVD link : CVE-2023-53896
Mitre link : CVE-2023-53896
CVE.ORG link : CVE-2023-53896
JSON object : View
Products Affected
dlink
- dap-1325
- dap-1325_firmware
CWE
CWE-306
Missing Authentication for Critical Function
