Количество 3
Количество 3

CVE-2025-9938
A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
GHSA-pmpm-w6cf-w2p8
A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

BDU:2025-10936
Уязвимость функции yyxz_dlink_asp() (/yyxz.asp) микропрограммного обеспечения маршрутизаторов D-Link DI-8400, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-9938 A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. | CVSS3: 8.8 | 0% Низкий | 19 дней назад |
GHSA-pmpm-w6cf-w2p8 A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. | CVSS3: 8.8 | 0% Низкий | 19 дней назад | |
![]() | BDU:2025-10936 Уязвимость функции yyxz_dlink_asp() (/yyxz.asp) микропрограммного обеспечения маршрутизаторов D-Link DI-8400, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 8.8 | 0% Низкий | 27 дней назад |
Уязвимостей на страницу