CVE-2025-7603
BaseFortify
Publication date: 2025-07-14
Last updated on: 2025-07-16
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dlink | di-8100_firmware | 16.07.26a1 |
| dlink | di-8100 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-119 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-7603 is a critical stack-based buffer overflow vulnerability in the D-Link DI-8100 router firmware version 16.07.26A1. It exists in the jingx_asp function of the HTTP Request Handler component, specifically in the /jingx.asp file. The vulnerability occurs due to improper input handling that allows an attacker to overflow a buffer on the stack by sending specially crafted HTTP requests remotely. This flaw can cause the router to crash or become unresponsive. [1, 2]
How can this vulnerability impact me? :
This vulnerability can be exploited remotely to cause a Denial of Service (DoS) by crashing the router or making it unresponsive. Additionally, because it is a stack-based buffer overflow, it may potentially compromise the confidentiality, integrity, and availability of the affected system. Exploitation requires some level of authentication but is considered easy to execute, and public exploits are available. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of the /jingx.asp endpoint on D-Link DI-8100 routers running firmware version 16.07.26A1. One method is to use HTTP requests targeting the /jingx.asp path to see if the device responds, indicating potential vulnerability. Additionally, attackers use Google dorking with the query "inurl:jingx.asp" to identify vulnerable targets. Network scanning tools or curl commands can be used to probe the endpoint. For example, using curl: curl -I http://<target-ip>/jingx.asp to check if the endpoint exists and responds. Monitoring for unusual crashes or DoS conditions on the router may also indicate exploitation attempts. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
No known mitigations or countermeasures have been documented for this vulnerability. The suggested immediate step is to replace the affected D-Link DI-8100 device with an alternative product. Until a patch or fix is available, limiting access to the device and monitoring for exploitation attempts may help reduce risk. [2]