We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability, which was classified as critical, was found in D-Link DIR-825 2.03. This affects the function do_file of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Es wurde eine kritische Schwachstelle in D-Link DIR-825 2.03 gefunden. Dabei betrifft es die Funktion do_file der Komponente HTTP POST Request Handler. Mit der Manipulation mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
2025-06-19: | Advisory disclosed |
2025-06-19: | VulDB entry created |
2025-06-19: | VulDB entry last update |
xiaobor123 (VulDB User)
vuldb.com/?id.313293 (VDB-313293 | D-Link DIR-825 HTTP POST Request do_file stack-based overflow)
vuldb.com/?ctiid.313293 (VDB-313293 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.593937 (Submit #593937 | dlink DIR-825 REVB_FIRMWARE_2.03 Stack-based Buffer Overflow)
github.com/...r123/vul-finds/tree/main/vul-find-dir825-dlink
github.com/...r123/vul-finds/tree/main/vul-find-dir825-dlink
www.dlink.com/
Support options