CVE-2025-71057 - Vulnerability Analysis
HighCVSS: 8.2Last Updated: February 27, 2026
D-Link Wireless N 300 ADSL2+ Modem Router DSL-124 ME_1.00 - Authentication Bypass
Overview
D-Link Wireless N 300 ADSL2+ Modem Router DSL-124 ME_1.00 contains an authentication bypass caused by improper session management allowing attackers to hijack sessions via IP address spoofing, exploit requires network access.
Severity & Score
Impact
Attackers can hijack authenticated user sessions, gaining unauthorized access to the device.
Mitigation
Update to the latest firmware version provided by D-Link.
References
Social Media Activity(1 post)
š CVE-2025-71057 - High (8.2) Improper session management in D-Link Wireless N 300 ADSL2+ Modem Router DSL-124 ME_1.00 allows attackers to execute a session hijacking attack via spoofing the IP address of an authenticated user. š https://www.thehackerwire.com/vulnerability/CVE-2025-71057/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2025-71057
- Severity
- High
- CVSS Score
- 8.2
- Type
- broken_authentication
- Status
- unconfirmed
- EPSS
- 1.4%
- Social Posts
- 1
CWE
- CWE-287
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N