轉發 國家資安資訊分享與分析中心 NISAC-200-202509-00000067
[內容說明]
研究人員發現台達電DIALink存在路徑遍歷(Path Traversal)漏洞(CVE-2025-58321)。未經身分鑑別之遠端攻擊者可利用此漏洞取得敏感資訊,進而繞過驗證並存取系統,請儘速確認並進行修補。
[影響平台]
DIALink V1.6.0.0(含)以前版本
[建議措施]
官方已針對漏洞釋出修復更新,請參考官方說明進行更新,網址如下: https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00016_DIALink%20-%20Directory%20Traversal%20Authentication%20Bypass%20Vulnerability.pdf
[參考資料]
1. https://nvd.nist.gov/vuln/detail/CVE-2025-58321
2. https://vulmon.com/vulnerabilitydetails?qid=CVE-2025-58321
3. https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00016_DIALink%20-%20Directory%20Traversal%20Authentication%20Bypass%20Vulnerability.pdf
Forwarded from the National Information Security Information Sharing and Analysis Center (NISAC-200-202509-00000067)
[Content Description]
Researchers have discovered a path traversal vulnerability (CVE-2025-58321) in Delta Electronics' DIALink. An unauthenticated remote attacker could exploit this vulnerability to obtain sensitive information, bypass authentication, and access the system. Please verify and patch as soon as possible.
[Affected Platforms]
DIALink V1.6.0.0 and earlier
[Recommended Action]
An official update has been released to fix the vulnerability. Please refer to the official instructions for updating: https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00016_DIALink%20-%20Directory%20Traversal%20Authentication%20Bypass%20Vulnerability.pdf
[References]
1. https://nvd.nist.gov/vuln/detail/CVE-2025-58321
2. https://vulmon.com/vulnerabilitydetails?qid=CVE-2025-58321
3. https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00016_DIALink%20-%20Directory%20Traversal%20Authentication%20Bypass%20Vulnerability.pdf
【資安漏洞預警】台達電DIALink存在高風險安全漏洞(CVE-2025-58321),請儘速確認並進行修補
[Security Vulnerability Alert] Delta Electronics' DIALink has a high-risk security vulnerability (CVE-2025-58321). Please confirm and patch it as soon as possible.
公告類別:行政公告
發佈日期:2025/09/25 至 2026/03/25
點閱數:82
返回列表