Skip to main content

CVE-2025-7790: Stack-based Buffer Overflow in D-Link DI-8100

High
VulnerabilityCVE-2025-7790cvecve-2025-7790
Published: Fri Jul 18 2025 (07/18/2025, 15:32:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DI-8100

Description

A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. This affects an unknown part of the file /menu_nat.asp of the component HTTP Request Handler. The manipulation of the argument out_addr/in_addr/out_port/proto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/26/2025, 00:54:26 UTC

Technical Analysis

CVE-2025-7790 is a critical stack-based buffer overflow vulnerability identified in the D-Link DI-8100 router, specifically in version 16.07.26A1. The vulnerability resides within the HTTP Request Handler component, particularly in the /menu_nat.asp file. It is triggered by manipulating certain HTTP request parameters such as out_addr, in_addr, out_port, and proto. These parameters are related to network address translation (NAT) configurations. By crafting malicious requests that overflow the stack buffer, an attacker can potentially execute arbitrary code remotely without requiring user interaction or prior authentication. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with attack vector being network-based, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, meaning successful exploitation could lead to full system compromise, including unauthorized access, data manipulation, or denial of service. Although no public exploits are currently observed in the wild, the exploit code has been disclosed publicly, increasing the risk of imminent attacks. The lack of available patches or vendor advisories further exacerbates the threat landscape for affected users.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on the D-Link DI-8100 router in their network infrastructure. Compromise of these routers could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and potential pivoting to other critical systems. This is particularly concerning for enterprises, government agencies, and critical infrastructure operators where network reliability and data confidentiality are paramount. The remote exploitability without authentication means attackers can scan and target vulnerable devices directly over the internet or internal networks, increasing the attack surface. Additionally, the public disclosure of exploit details raises the likelihood of automated scanning and exploitation campaigns targeting European networks. Organizations with limited network segmentation or outdated device inventories are at higher risk of exposure and impact.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the management interface of the D-Link DI-8100 routers by applying strict firewall rules to limit HTTP access only to trusted IP addresses or internal management networks. 2) Disabling remote management features if not strictly necessary to reduce exposure. 3) Monitoring network traffic for unusual or malformed HTTP requests targeting /menu_nat.asp or suspicious parameter patterns indicative of exploitation attempts. 4) Employing intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts. 5) Conducting an inventory audit to identify all affected devices and prioritizing their replacement or segmentation. 6) Contacting D-Link support for any forthcoming patches or firmware updates and planning timely deployment once available. 7) Implementing network segmentation to isolate vulnerable devices from critical assets. 8) Educating network administrators about this vulnerability and ensuring incident response readiness in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-18T07:36:19.458Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687a6c42a83201eaacf4a491

Added to database: 7/18/2025, 3:46:10 PM

Last enriched: 7/26/2025, 12:54:26 AM

Last updated: 8/18/2025, 1:22:23 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats