Home

Description

EN DE

A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

In D-Link DIR-825 1.08.01 wurde eine Schwachstelle gefunden. Es geht um die Funktion get_ping6_app_stat der Datei ping6_response.cg der Komponente httpd. Durch Manipulieren des Arguments ping6_ipaddr mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-09-05 | Published 2025-09-06 | Updated 2025-09-08 | Assigner VulDB




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
9.0AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Buffer Overflow

Memory Corruption

Product status

1.08.01
affected

Timeline

2025-09-05:Advisory disclosed
2025-09-05:VulDB entry created
2025-09-05:VulDB entry last update

Credits

Jason J (VulDB User) reporter

References

vuldb.com/?id.322750 (VDB-322750 | D-Link DIR-825 httpd ping6_response.cg get_ping6_app_stat buffer overflow) vdb-entry technical-description

vuldb.com/?ctiid.322750 (VDB-322750 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.643978 (Submit #643978 | D-Link DIR-825L v1.08.01 Buffer Overflow) third-party-advisory

github.com/Jjx-wy/D-Link/blob/main/D-Link DIR-825 2.10.pdf exploit

www.dlink.com/ product

cve.org (CVE-2025-10034)

nvd.nist.gov (CVE-2025-10034)

Download JSON