Vulnerability Description
A vulnerability was found in D-Link DI-8100 16.07.26A1 and classified as critical. This issue affects some unknown processing of the file /arp_sys.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Di-8100 Firmware | 16.07.26a1 |
| Dlink | Di-8100 | - |
Related Weaknesses (CWE)
References
- https://github.com/XiDP0/MyCVE/blob/main/CVE/D-Link%20DI_8100-16.07.26A1/arp_sysExploitThird Party Advisory
- https://vuldb.com/?ctiid.316301Permissions RequiredVDB Entry
- https://vuldb.com/?id.316301Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.615302Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
- https://github.com/XiDP0/MyCVE/blob/main/CVE/D-Link%20DI_8100-16.07.26A1/arp_sysExploitThird Party Advisory
FAQ
What is CVE-2025-7602?
CVE-2025-7602 is a vulnerability with a CVSS score of 7.2 (HIGH). A vulnerability was found in D-Link DI-8100 16.07.26A1 and classified as critical. This issue affects some unknown processing of the file /arp_sys.asp of the component HTTP Request Handler. The manipu...
How severe is CVE-2025-7602?
CVE-2025-7602 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-7602?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Di-8100 Firmware, Dlink Di-8100.