Impact
A stack‑based buffer overflow exists in the NMBD_process function of the nmbd component on D‑Link DIR‑825 devices running firmware 3.00b32. The flaw can be triggered from the local network and, if exploited, could allow an attacker to execute arbitrary code on the device, thereby compromising confidentiality, integrity, and availability. The vulnerability is classified as CWE‑119 and CWE‑120.
Affected Systems
The affected product is the D‑Link DIR‑825 router, firmware version 3.00b32 and potentially other versions that are no longer supported by the vendor. No other vendors or product lines are listed.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity, while the EPSS score of less than 1% signals a low current exploitation probability; nonetheless, public exploit code exists. The vulnerability is not listed in the CISA KEV catalog. Because the attack vector is limited to the local network, an attacker must first gain local network access before triggering the buffer overflow to obtain remote code execution on the device.
OpenCVE Enrichment