{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T20:02:50.843","vulnerabilities":[{"cve":{"id":"CVE-2025-45784","sourceIdentifier":"cve@mitre.org","published":"2025-06-18T14:15:44.553","lastModified":"2025-07-22T14:24:59.443","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"D-Link DPH-400S/SE VoIP Phone v1.01 contains hardcoded provisioning variables, including PROVIS_USER_PASSWORD, which may expose sensitive user credentials. An attacker with access to the firmware image can extract these credentials using static analysis tools such as strings or xxd, potentially leading to unauthorized access to device functions or user accounts. This vulnerability exists due to insecure storage of sensitive information in the firmware binary."},{"lang":"es","value":"D-Link DPH-400S/SE VoIP Phone v1.01 contiene variables de aprovisionamiento codificadas, como PROVIS_USER_PASSWORD, que pueden exponer credenciales de usuario confidenciales. Un atacante con acceso a la imagen del firmware puede extraer estas credenciales mediante herramientas de análisis estático como cadenas o xxd, lo que podría provocar acceso no autorizado a funciones del dispositivo o cuentas de usuario. Esta vulnerabilidad se debe al almacenamiento inseguro de información confidencial en el binario del firmware."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-798"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dph-400se_firmware:1.01:*:*:*:*:*:*:*","matchCriteriaId":"798F2BDE-82ED-4697-9B6F-426FCBC2449E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dph-400se:-:*:*:*:*:*:*:*","matchCriteriaId":"49439D1C-6BC2-43CB-9716-F04552545CFF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dph-400s_firmware:1.01:*:*:*:*:*:*:*","matchCriteriaId":"CF9A5FC5-3433-4D34-8BC3-ED5A24411255"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dph-400s:-:*:*:*:*:*:*:*","matchCriteriaId":"06CEADB2-33B4-4463-8CCC-D13E0CD282CD"}]}]}],"references":[{"url":"https://cybermaya.in/posts/Post-37/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.dlink.com/en/security-bulletin/","source":"cve@mitre.org","tags":["Vendor Advisory"]}]}}]}