Vulnerability Description
A vulnerability, which was classified as critical, has been found in D-Link DIR-825 2.10. This issue affects the function sub_410DDC of the file switch_language.cgi of the component httpd. The manipulation of the argument Language leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-825 Firmware | 2.10 |
| Dlink | Dir-825 | - |
Related Weaknesses (CWE)
References
- https://github.com/i-Corner/cve/issues/2ExploitIssue Tracking
- https://vuldb.com/?ctiid.315155Permissions RequiredVDB Entry
- https://vuldb.com/?id.315155Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.607661Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
- https://github.com/i-Corner/cve/issues/2ExploitIssue Tracking
FAQ
What is CVE-2025-7206?
CVE-2025-7206 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A vulnerability, which was classified as critical, has been found in D-Link DIR-825 2.10. This issue affects the function sub_410DDC of the file switch_language.cgi of the component httpd. The manipul...
How severe is CVE-2025-7206?
CVE-2025-7206 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-7206?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-825 Firmware, Dlink Dir-825.