Stack-based Buffer Overflow in D-Link DIR-825 HTTPd Component
CVE-2025-7206

9.3CRITICAL

Key Information:

Vendor

D-link

Status
Vendor
CVE Published:
9 July 2025

Badges

📈 Score: 438👾 Exploit Exists🟡 Public PoC📰 News Worthy

What is CVE-2025-7206?

CVE-2025-7206 is a critical vulnerability affecting the D-Link DIR-825 series routers, specifically in the HTTPd component. This vulnerability arises from a stack-based buffer overflow caused by the improper handling of input in the function sub_410DDC within the file switch_language.cgi. As a result, an attacker can manipulate the 'Language' argument to execute arbitrary code remotely. This situation poses a substantial risk, especially since these devices are largely unsupported by the vendor, leaving them vulnerable to exploitation. The exploitation of this vulnerability could lead to unauthorized remote access and control of the router, enabling attackers to compromise the network and potential connected devices.

Potential impact of CVE-2025-7206

  1. Remote Code Execution: The primary impact of this vulnerability is that it allows malicious actors to execute arbitrary code on affected devices. This exploit could lead to full control over the router, allowing for further malicious activities within the network.

  2. Network Compromise: With control over the router, attackers could intercept and manipulate network traffic, leading to data breaches, credential theft, and unauthorized access to sensitive information within the organization's network.

  3. Increased Risk of Malware Propagation: Given the potential for remote access, exploited devices may serve as launching pads for further attacks within an organization or may be leveraged to distribute malware, increasing the overall risk of cyber incidents.

Affected Version(s)

DIR-825 2.10

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Critical D-Link Vulnerability Lets Remote Attackers Crash Servers Without Authentication

Security researchers have discovered a critical stack-based buffer overflow vulnerability in D-Link DIR-825 Rev.B 2.10 routers.

5 days ago

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 📰

    First article discovered by GBHackers Security | #1 Globally Trusted Cyber Security News Platform

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

.