Описание
A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-9938
- https://github.com/ZZ2266/.github.io/tree/main/Dlink/DI-8400/yyxz.asp
- https://github.com/ZZ2266/.github.io/tree/main/Dlink/DI-8400/yyxz.asp#proof-of-concept-poc
- https://vuldb.com/?ctiid.322340
- https://vuldb.com/?id.322340
- https://vuldb.com/?submit.643446
- https://www.dlink.com
Связанные уязвимости
A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
Уязвимость функции yyxz_dlink_asp() (/yyxz.asp) микропрограммного обеспечения маршрутизаторов D-Link DI-8400, позволяющая нарушителю вызвать отказ в обслуживании