CVE-2025-7602

| EUVD-2025-21345 HIGH
2025-07-14 [email protected]
7.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:43 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:43 euvd
EUVD-2025-21345
PoC Detected
Jul 16, 2025 - 14:32 vuln.today
Public exploit code
CVE Published
Jul 14, 2025 - 12:15 nvd
HIGH 7.2

Description

A vulnerability was found in D-Link DI-8100 16.07.26A1 and classified as critical. This issue affects some unknown processing of the file /arp_sys.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7602 is a critical stack-based buffer overflow vulnerability in D-Link DI-8100 firmware version 16.07.26A1 affecting the /arp_sys.asp HTTP endpoint. An authenticated remote attacker with high privileges can exploit this vulnerability to achieve arbitrary code execution, potentially compromising device integrity, confidentiality, and availability. Public exploit code is available, elevating real-world risk despite the CVSS 7.2 score.

Technical Context

The vulnerability exists in the HTTP Request Handler component processing the /arp_sys.asp file on D-Link DI-8100 network devices (CPE: cpe:2.3:o:d-link:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:*). The root cause is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), specifically a stack-based buffer overflow. This occurs when user-supplied input from HTTP requests is copied into a fixed-size stack buffer without proper bounds checking, allowing an attacker to overflow the buffer and overwrite the stack, potentially hijacking program control flow. The /arp_sys.asp endpoint processes ARP system configuration requests, and the overflow likely stems from inadequate input validation on parameters passed to this ASP handler.

Affected Products

[{'vendor': 'D-Link', 'product': 'DI-8100', 'affected_versions': ['16.07.26A1'], 'cpe': 'cpe:2.3:o:d-link:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:*', 'component': 'HTTP Request Handler (/arp_sys.asp)', 'type': 'Network routing device firmware'}]

Remediation

Immediate actions: (1) Upgrade D-Link DI-8100 firmware to the latest patched version beyond 16.07.26A1; contact D-Link support for availability of security patches (vendor advisory: https://support.d-link.com should be checked for CVE-2025-7602 patch notes); (2) Restrict administrative access to the DI-8100 management interface using network ACLs and VPN, limiting access to trusted administrative IPs only; (3) Disable or restrict HTTP access to /arp_sys.asp endpoint if not required through firewall rules or device-level access controls; (4) Implement strong, unique passwords for all administrative accounts; (5) Monitor device logs for suspicious HTTP requests to /arp_sys.asp with unusual input parameters; (6) Consider network segmentation to isolate the DI-8100 from untrusted administrative networks. Long-term: implement automated firmware update policies and maintain security patch subscriptions with D-Link.

Priority Score

56
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +36
POC: +20

Share

CVE-2025-7602 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy