Логотип exploitDog
bind:CVE-2025-10034
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-10034

Количество 3

Количество 3

nvd логотип

CVE-2025-10034

5 месяцев назад

A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-86jv-9769-vqj5

5 месяцев назад

A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-10874

5 месяцев назад

Уязвимость функции get_ping6_app_stat() микропрограммного обеспечения маршрутизаторов D-Link DIR-825, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-10034

A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
0%
Низкий
5 месяцев назад
github логотип
GHSA-86jv-9769-vqj5

A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-10874

Уязвимость функции get_ping6_app_stat() микропрограммного обеспечения маршрутизаторов D-Link DIR-825, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
5 месяцев назад

Уязвимостей на страницу