CVE-2025-3538

A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been rated as critical. This issue affects the function auth_asp of the file /auth.asp of the component jhttpd. The manipulation of the argument callback leads to stack-based buffer overflow. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/Fizz-L/CVE1/blob/main/DI-8100Command%20execution2.md Exploit VDB Entry Third Party Advisory
https://vuldb.com/?ctiid.304577 Permissions Required VDB Entry
https://vuldb.com/?id.304577 Third Party Advisory VDB Entry
https://vuldb.com/?submit.524224 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:*
cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:*

History

16 Jul 2025, 15:36

Type Values Removed Values Added
References () https://github.com/Fizz-L/CVE1/blob/main/DI-8100Command%20execution2.md - () https://github.com/Fizz-L/CVE1/blob/main/DI-8100Command%20execution2.md - Exploit, VDB Entry, Third Party Advisory
References () https://vuldb.com/?ctiid.304577 - () https://vuldb.com/?ctiid.304577 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.304577 - () https://vuldb.com/?id.304577 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.524224 - () https://vuldb.com/?submit.524224 - Third Party Advisory, VDB Entry
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product
CWE CWE-787
First Time Dlink
Dlink di-8100 Firmware
Dlink di-8100
CPE cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:*

15 Apr 2025, 18:39

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en D-Link DI-8100 16.07.26A1. Se ha clasificado como crítica. Este problema afecta a la función auth_asp del archivo /auth.asp del componente jhttpd. La manipulación de la devolución de llamada del argumento provoca un desbordamiento del búfer basado en la pila. El ataque debe abordarse dentro de la red local. Se ha hecho público el exploit y puede que sea utilizado.

13 Apr 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-13 19:15

Updated : 2025-07-16 15:36


NVD link : CVE-2025-3538

Mitre link : CVE-2025-3538

CVE.ORG link : CVE-2025-3538


JSON object : View

Products Affected

dlink

  • di-8100
  • di-8100_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write