Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pjcw-w6g8-m779

Опубликовано: 14 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.3
CVSS3: 7.2

Описание

A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. Affected is an unknown function of the file /jingx.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. Affected is an unknown function of the file /jingx.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 45%
0.00223
Низкий

7.3 High

CVSS4

7.2 High

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 7.2
nvd
около 2 месяцев назад

A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. Affected is an unknown function of the file /jingx.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 7.2
fstec
около 2 месяцев назад

Уязвимость функции jingx_asp() микропрограммного обеспечения маршрутизаторов D-Link DI-8100, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 45%
0.00223
Низкий

7.3 High

CVSS4

7.2 High

CVSS3

Дефекты

CWE-119