CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. Affected is an unknown function of the file /jingx.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7603 is a critical stack-based buffer overflow vulnerability in D-Link DI-8100 firmware version 16.07.26A1, affecting the HTTP Request Handler component (/jingx.asp file). An authenticated remote attacker with high privileges can exploit this vulnerability to achieve complete compromise of the device, including code execution, data theft, and denial of service. A public proof-of-concept exploit exists, increasing real-world exploitation risk.
Technical Context
The vulnerability resides in the D-Link DI-8100 router's HTTP request handler, specifically within the /jingx.asp file processing. The root cause is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), manifesting as a stack-based buffer overflow. This occurs when user-supplied input from HTTP requests is copied into a fixed-size stack buffer without proper bounds checking. The affected CPE is likely: cpe:2.3:o:d-link:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:* and cpe:2.3:h:d-link:di-8100:*:*:*:*:*:*:*:*. The HTTP Request Handler component processes unvalidated input, allowing stack memory corruption and potential arbitrary code execution through stack frame manipulation and return address overwriting.
Affected Products
[{'vendor': 'D-Link', 'product': 'DI-8100', 'affected_versions': ['16.07.26A1'], 'component': 'HTTP Request Handler (/jingx.asp)', 'device_type': 'Broadband Router', 'cpe': 'cpe:2.3:o:d-link:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:*'}]
Remediation
Immediate actions: (1) Contact D-Link support to determine if firmware patches are available for the DI-8100 device; (2) If firmware updates exist, apply them immediately to the affected device; (3) If no patches are available and the device is end-of-life, strongly consider hardware replacement with a current, supported model; (4) Implement network segmentation to restrict access to device administration interfaces—limit /jingx.asp access to trusted administrative networks only via firewall rules; (5) Enforce strong authentication credentials and disable default passwords on the device; (6) Monitor for suspicious HTTP requests to /jingx.asp with abnormally large payloads or encoded content; (7) Consider disabling remote management features if not required; (8) Review D-Link security advisories at https://www.dlink.com/en/security for any available patches or workarounds; (9) If the device is internet-facing, immediately move it behind a NAT firewall with restricted port access.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21344