CVE-2025-11339: Buffer Overflow in D-Link DI-7100G C1
A vulnerability has been found in D-Link DI-7100G C1 up to 20250928. This issue affects the function sub_4BD4F8 of the file /webchat/hi_block.asp of the component jhttpd. The manipulation of the argument popupId leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-11339 is a remote buffer overflow vulnerability identified in the D-Link DI-7100G C1 device, specifically within the jhttpd web server component. The vulnerability exists in the function sub_4BD4F8 of the /webchat/hi_block.asp file, where improper validation and handling of the popupId argument leads to a buffer overflow condition. This flaw can be exploited by an unauthenticated attacker remotely by sending a specially crafted request to the vulnerable endpoint, causing memory corruption. The buffer overflow can potentially allow arbitrary code execution, leading to full compromise of the device, including unauthorized access, data manipulation, or denial of service. The vulnerability affects firmware versions up to 20250928, and the CVSS 4.0 score is 8.7, indicating high severity with network attack vector, low attack complexity, no privileges or user interaction required, but with high impact on confidentiality, integrity, and availability. Although no active exploits have been observed in the wild, public exploit code has been disclosed, increasing the likelihood of exploitation attempts. The vulnerability is critical for environments relying on these devices for network connectivity or communication services, as compromise could lead to lateral movement within networks or disruption of services.
Potential Impact
For European organizations, the impact of CVE-2025-11339 can be severe. The D-Link DI-7100G C1 is often deployed in enterprise and telecom environments, and exploitation could lead to unauthorized remote control of network devices. This compromises confidentiality by exposing sensitive network traffic or credentials, integrity by allowing attackers to alter device configurations or data, and availability by causing device crashes or network outages. Critical infrastructure sectors such as telecommunications, government agencies, and large enterprises are at heightened risk due to their reliance on stable and secure network devices. The public disclosure of exploit code increases the risk of opportunistic attacks, potentially leading to widespread disruption. Additionally, compromised devices could be leveraged as pivot points for further attacks within organizational networks, amplifying the overall security risk.
Mitigation Recommendations
1. Immediate action should be taken to check for firmware updates from D-Link addressing this vulnerability; apply patches as soon as they become available. 2. If patches are not yet released, restrict network access to the vulnerable device’s management interfaces, especially blocking access to the /webchat/hi_block.asp endpoint from untrusted networks. 3. Employ network segmentation to isolate vulnerable devices from critical network segments. 4. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect attempts to exploit buffer overflow conditions targeting the popupId parameter. 5. Regularly audit and monitor device logs for unusual activity or repeated access attempts to the vulnerable endpoint. 6. Consider deploying web application firewalls (WAF) or reverse proxies to filter malicious payloads targeting the affected function. 7. Educate network administrators on the risks and signs of exploitation to enable rapid incident response. 8. Maintain an inventory of all D-Link DI-7100G C1 devices in use to ensure comprehensive coverage of mitigation efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-11339: Buffer Overflow in D-Link DI-7100G C1
Description
A vulnerability has been found in D-Link DI-7100G C1 up to 20250928. This issue affects the function sub_4BD4F8 of the file /webchat/hi_block.asp of the component jhttpd. The manipulation of the argument popupId leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11339 is a remote buffer overflow vulnerability identified in the D-Link DI-7100G C1 device, specifically within the jhttpd web server component. The vulnerability exists in the function sub_4BD4F8 of the /webchat/hi_block.asp file, where improper validation and handling of the popupId argument leads to a buffer overflow condition. This flaw can be exploited by an unauthenticated attacker remotely by sending a specially crafted request to the vulnerable endpoint, causing memory corruption. The buffer overflow can potentially allow arbitrary code execution, leading to full compromise of the device, including unauthorized access, data manipulation, or denial of service. The vulnerability affects firmware versions up to 20250928, and the CVSS 4.0 score is 8.7, indicating high severity with network attack vector, low attack complexity, no privileges or user interaction required, but with high impact on confidentiality, integrity, and availability. Although no active exploits have been observed in the wild, public exploit code has been disclosed, increasing the likelihood of exploitation attempts. The vulnerability is critical for environments relying on these devices for network connectivity or communication services, as compromise could lead to lateral movement within networks or disruption of services.
Potential Impact
For European organizations, the impact of CVE-2025-11339 can be severe. The D-Link DI-7100G C1 is often deployed in enterprise and telecom environments, and exploitation could lead to unauthorized remote control of network devices. This compromises confidentiality by exposing sensitive network traffic or credentials, integrity by allowing attackers to alter device configurations or data, and availability by causing device crashes or network outages. Critical infrastructure sectors such as telecommunications, government agencies, and large enterprises are at heightened risk due to their reliance on stable and secure network devices. The public disclosure of exploit code increases the risk of opportunistic attacks, potentially leading to widespread disruption. Additionally, compromised devices could be leveraged as pivot points for further attacks within organizational networks, amplifying the overall security risk.
Mitigation Recommendations
1. Immediate action should be taken to check for firmware updates from D-Link addressing this vulnerability; apply patches as soon as they become available. 2. If patches are not yet released, restrict network access to the vulnerable device’s management interfaces, especially blocking access to the /webchat/hi_block.asp endpoint from untrusted networks. 3. Employ network segmentation to isolate vulnerable devices from critical network segments. 4. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect attempts to exploit buffer overflow conditions targeting the popupId parameter. 5. Regularly audit and monitor device logs for unusual activity or repeated access attempts to the vulnerable endpoint. 6. Consider deploying web application firewalls (WAF) or reverse proxies to filter malicious payloads targeting the affected function. 7. Educate network administrators on the risks and signs of exploitation to enable rapid incident response. 8. Maintain an inventory of all D-Link DI-7100G C1 devices in use to ensure comprehensive coverage of mitigation efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-05T22:09:06.624Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e3f2c5083a44572bc2aa16
Added to database: 10/6/2025, 4:48:05 PM
Last enriched: 10/6/2025, 4:48:31 PM
Last updated: 10/7/2025, 8:09:21 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11357: SQL Injection in code-projects Simple Banking System
MediumCVE-2025-7400: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-11355: Buffer Overflow in UTT 1250GW
HighCVE-2025-11356: Buffer Overflow in Tenda AC23
HighCVE-2025-11354: Unrestricted Upload in code-projects Online Hotel Reservation System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.