CVE-2025-12295

MEDIUM (6.6) No Patch (53 days)

Threat Intelligence

Low Risk
EPSS Score: 0.12% chance of exploitation (percentile: 31%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

A weakness has been identified in D-Link DAP-2695 2.00RC13. The affected element is the function sub_40C6B8 of the component Firmware Update Handler. Executing manipulation can lead to improper verification of cryptographic signature. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer suppo

Am I affected?

You're affected if you use A weakness. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

How to fix

See the GitHub issue/commit: https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Dlink/DAP-2695_Inte.md