Vulnerability Description
A vulnerability was identified in D-Link DIR-825 2.10. Affected by this vulnerability is the function get_ping_app_stat of the file ping_response.cgi of the component httpd. The manipulation of the argument ping_ipaddr leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-825 Firmware | 2.10 |
| Dlink | Dir-825 | - |
Related Weaknesses (CWE)
References
- https://github.com/i-Corner/cve/issues/16ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.319915Permissions Required
- https://vuldb.com/?id.319915Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.627640Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2025-8949?
CVE-2025-8949 is a vulnerability with a CVSS score of 7.2 (HIGH). A vulnerability was identified in D-Link DIR-825 2.10. Affected by this vulnerability is the function get_ping_app_stat of the file ping_response.cgi of the component httpd. The manipulation of the ar...
How severe is CVE-2025-8949?
CVE-2025-8949 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-8949?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-825 Firmware, Dlink Dir-825.