LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2025-71057

CVE-2025-71057 - Vulnerability Analysis

HighCVSS: 8.2

Last Updated: February 27, 2026

D-Link Wireless N 300 ADSL2+ Modem Router DSL-124 ME_1.00 - Authentication Bypass

Published: February 26, 2026Updated: February 27, 2026Remote Exploitable

Overview

D-Link Wireless N 300 ADSL2+ Modem Router DSL-124 ME_1.00 contains an authentication bypass caused by improper session management allowing attackers to hijack sessions via IP address spoofing, exploit requires network access.

Severity & Score

Severity: High
CVSS Score: 8.2
EPSS Score: 1.4%(Probability of exploitation in next 30 days)

Impact

Attackers can hijack authenticated user sessions, gaining unauthorized access to the device.

Mitigation

Update to the latest firmware version provided by D-Link.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 28, 2026

🟠 CVE-2025-71057 - High (8.2) Improper session management in D-Link Wireless N 300 ADSL2+ Modem Router DSL-124 ME_1.00 allows attackers to execute a session hijacking attack via spoofing the IP address of an authenticated user. šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2025-71057/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2025-71057
Severity
High
CVSS Score
8.2
Type
broken_authentication
Status
unconfirmed
EPSS
1.4%
Social Posts
1

CWE

  • CWE-287

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

EPSS Score

1.4%Probability of exploitation in the next 30 days