CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-3538: D-Link DI-8100 jhttpd auth.asp auth_asp stack-based overflow

8.7 CVSS

Description

A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been rated as critical. This issue affects the function auth_asp of the file /auth.asp of the component jhttpd. The manipulation of the argument callback leads to stack-based buffer overflow. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used. Eine Schwachstelle wurde in D-Link DI-8100 16.07.26A1 ausgemacht. Sie wurde als kritisch eingestuft. Dies betrifft die Funktion auth_asp der Datei /auth.asp der Komponente jhttpd. Durch das Beeinflussen des Arguments callback mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.

Classification

CVE ID: CVE-2025-3538

CVSS Base Severity: HIGH

CVSS Base Score: 8.7

CVSS Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem Types

Stack-based Buffer Overflow Memory Corruption

Affected Products

Vendor: D-Link

Product: DI-8100

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.03% (probability of being exploited)

EPSS Percentile: 8.39% (scored less or equal to compared to others)

EPSS Date: 2025-05-12 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-3538
https://vuldb.com/?id.304577
https://vuldb.com/?ctiid.304577
https://vuldb.com/?submit.524224
https://github.com/Fizz-L/CVE1/blob/main/DI-8100Command%20execution2.md
https://www.dlink.com/

Timeline