Critical Null Pointer Deref in D-Link DAP-1562 1.10 HTTP POST Handler
CVE-2025-1877 Published on March 3, 2025

D-Link DAP-1562 HTTP POST Request pure_auth_check null pointer dereference
A vulnerability, which was classified as critical, was found in D-Link DAP-1562 1.10. This affects the function pure_auth_check of the component HTTP POST Request Handler. The manipulation of the argument a1 leads to null pointer dereference. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

NVD

Timeline

Advisory disclosed

VulDB entry created

VulDB entry last update

Weakness Types

NULL Pointer Dereference

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.

Improper Resource Shutdown or Release

The program does not release or incorrectly releases a resource before it is made available for re-use. When a resource is created or allocated, the developer is responsible for properly releasing the resource as well as accounting for all potential paths of expiration or invalidation, such as a set period of time or revocation.


Products Associated with CVE-2025-1877

Want to know whenever a new CVE is published for D-Link Dap 1562 Firmware? stack.watch will email you.

 

Affected Versions

D-Link DAP-1562 Version 1.10 is affected by CVE-2025-1877

Exploit Probability

EPSS
0.30%
Percentile
53.35%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.