Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Western Digital recommends users download the latest version from the WD Discovery Downloads page or by following the instructions on the WD Discovery: Online User Guide https://support-en.wd.com/app/answers/detailweb/a_id/20465
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 27 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Westerndigital
Westerndigital wd Discovery |
|
| Vendors & Products |
Westerndigital
Westerndigital wd Discovery |
Mon, 26 Jan 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV4_0
|
cvssV4_0
|
Mon, 26 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DLL hijacking in the WD Discovery Installer in Western Digital WD Discovery 5.2.730 on Windows allows a local attacker to execute arbitrary code via placement of a crafted dll in the installer's search path. | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: WDC PSIRT
Published:
Updated: 2026-01-27T21:33:27.911Z
Reserved: 2025-03-19T16:24:18.441Z
Link: CVE-2025-30248
Updated: 2026-01-27T21:33:23.355Z
Status : Deferred
Published: 2026-01-26T23:15:54.373
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-30248
No data.
OpenCVE Enrichment
Updated: 2026-01-27T09:03:26Z