Stack-based Buffer Overflow in D-Link DI-8100 HTTP Request Handler
CVE-2025-7603
8.6HIGH
Key Information:
Badges
👾 Exploit Exists🟡 Public PoC
What is CVE-2025-7603?
A vulnerability exists in the D-Link DI-8100's HTTP Request Handler, specifically within the /jingx.asp file. An attacker can exploit this flaw remotely by manipulating input, leading to a stack-based buffer overflow. The vulnerability has been publicly disclosed, making it a potential target for attackers. Users are advised to review their security measures and keep their firmware up to date to protect against possible exploitation.
Affected Version(s)
DI-8100 16.07.26A1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
XiDP (VulDB User)