Логотип exploitDog
bind:CVE-2025-6292
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-6292

Количество 3

Количество 3

nvd логотип

CVE-2025-6292

8 месяцев назад

A vulnerability has been found in D-Link DIR-825 2.03 and classified as critical. This vulnerability affects the function sub_4091AC of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-h7h4-62pm-28jf

8 месяцев назад

A vulnerability has been found in D-Link DIR-825 2.03 and classified as critical. This vulnerability affects the function sub_4091AC of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-07583

8 месяцев назад

Уязвимость функции sub_4091AC() микропрограммного обеспечения маршрутизаторов D-Link DIR-825, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-6292

A vulnerability has been found in D-Link DIR-825 2.03 and classified as critical. This vulnerability affects the function sub_4091AC of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
0%
Низкий
8 месяцев назад
github логотип
GHSA-h7h4-62pm-28jf

A vulnerability has been found in D-Link DIR-825 2.03 and classified as critical. This vulnerability affects the function sub_4091AC of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 8.8
0%
Низкий
8 месяцев назад
fstec логотип
BDU:2025-07583

Уязвимость функции sub_4091AC() микропрограммного обеспечения маршрутизаторов D-Link DIR-825, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.8
0%
Низкий
8 месяцев назад

Уязвимостей на страницу