Stack-based Buffer Overflow in D-Link DI-8400 Router
CVE-2025-9938

8.7HIGH

Key Information:

Vendor

D-link

Status
Vendor
CVE Published:
3 September 2025

Badges

📈 Score: 255👾 Exploit Exists🟡 Public PoC

What is CVE-2025-9938?

CVE-2025-9938 is a serious vulnerability found in the D-Link DI-8400 router, specifically affecting firmware version 16.07.26A1. This vulnerability results from a stack-based buffer overflow in the function yyxz_dlink_asp within the /yyxz.asp file. Attackers can manipulate the argument ID to trigger this overflow, enabling unauthorized actions. Given that the router is a critical device for managing internet connectivity and security in home and business environments, the existence of this vulnerability poses a significant threat. If exploited, an attacker could gain the ability to execute arbitrary code or commands remotely, compromising the integrity and confidentiality of the network, and potentially leading to a full takeover of the router itself.

Potential impact of CVE-2025-9938

  1. Remote Code Execution: The vulnerability allows attackers to execute arbitrary code on the affected router remotely. This could enable them to manipulate network traffic, install malicious software, or take control of connected devices.

  2. Network Compromise: By exploiting the vulnerability, an attacker could gain access to sensitive data flowing through the router, including unencrypted passwords, private communications, and personal information, leading to significant privacy violations and potential data breaches.

  3. Ransomware Deployment: Although the specific involvement of ransomware groups in exploiting this vulnerability is not defined, the potential for deploying ransomware is very real. Control over the router could provide an attacker a launching point for lateral movement within a network, facilitating broader attacks that could lock critical files and demand ransom for their release.

Affected Version(s)

DI-8400 16.07.26A1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

n0ps1ed (VulDB User)
.