A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
Metrics
Affected Vendors & Products
References
History
Wed, 03 Sep 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. | |
Title | D-Link DI-8400 yyxz.asp yyxz_dlink_asp stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-03T23:32:10.606Z
Reserved: 2025-09-03T11:41:59.634Z
Link: CVE-2025-9938

No data.

No data.

No data.

No data.