A vulnerability was found in D-Link DI-500WF 17.04.10A1T. It has been declared as critical. Affected by this vulnerability is the function sprintf of the file ip_position.asp of the component jhttpd. The manipulation of the argument ip leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/BigMancer/CVE/issues/1 | Exploit Issue Tracking |
https://vuldb.com/?ctiid.315133 | Permissions Required VDB Entry |
https://vuldb.com/?id.315133 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.607311 | Third Party Advisory VDB Entry |
https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
14 Jul 2025, 15:14
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dlink
Dlink di-500wf Firmware Dlink di-500wf |
|
References | () https://github.com/BigMancer/CVE/issues/1 - Exploit, Issue Tracking | |
References | () https://vuldb.com/?ctiid.315133 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.315133 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.607311 - Third Party Advisory, VDB Entry | |
References | () https://www.dlink.com/ - Product | |
CPE | cpe:2.3:o:dlink:di-500wf_firmware:17.04.10a1t:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-500wf:-:*:*:*:*:*:*:* |
10 Jul 2025, 13:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Jul 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-08 21:15
Updated : 2025-07-14 15:14
NVD link : CVE-2025-7194
Mitre link : CVE-2025-7194
CVE.ORG link : CVE-2025-7194
JSON object : View
Products Affected
dlink
- di-500wf_firmware
- di-500wf