Stack-based Buffer Overflow in D-Link DI-8400 Router
CVE-2025-9938
Key Information:
Badges
What is CVE-2025-9938?
CVE-2025-9938 is a serious vulnerability found in the D-Link DI-8400 router, specifically affecting firmware version 16.07.26A1. This vulnerability results from a stack-based buffer overflow in the function yyxz_dlink_asp
within the /yyxz.asp
file. Attackers can manipulate the argument ID
to trigger this overflow, enabling unauthorized actions. Given that the router is a critical device for managing internet connectivity and security in home and business environments, the existence of this vulnerability poses a significant threat. If exploited, an attacker could gain the ability to execute arbitrary code or commands remotely, compromising the integrity and confidentiality of the network, and potentially leading to a full takeover of the router itself.
Potential impact of CVE-2025-9938
-
Remote Code Execution: The vulnerability allows attackers to execute arbitrary code on the affected router remotely. This could enable them to manipulate network traffic, install malicious software, or take control of connected devices.
-
Network Compromise: By exploiting the vulnerability, an attacker could gain access to sensitive data flowing through the router, including unencrypted passwords, private communications, and personal information, leading to significant privacy violations and potential data breaches.
-
Ransomware Deployment: Although the specific involvement of ransomware groups in exploiting this vulnerability is not defined, the potential for deploying ransomware is very real. Control over the router could provide an attacker a launching point for lateral movement within a network, facilitating broader attacks that could lock critical files and demand ransom for their release.
Affected Version(s)
DI-8400 16.07.26A1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved