Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pmpm-w6cf-w2p8

Опубликовано: 04 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.4
CVSS3: 8.8

Описание

A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

EPSS

Процентиль: 27%
0.00094
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 8.8
nvd
19 дней назад

A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVSS3: 8.8
fstec
27 дней назад

Уязвимость функции yyxz_dlink_asp() (/yyxz.asp) микропрограммного обеспечения маршрутизаторов D-Link DI-8400, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 27%
0.00094
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119