First published: Tue Feb 18 2025(Updated: )
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the destination, netmask, and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DSL-3782 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25896 is classified as a critical severity vulnerability due to its potential to cause a Denial of Service.
To fix CVE-2025-25896, it is recommended to update the D-Link DSL-3782 firmware to the latest version released by D-Link.
CVE-2025-25896 can lead to a Denial of Service, causing the affected D-Link DSL-3782 device to crash or become unresponsive.
CVE-2025-25896 specifically affects D-Link DSL-3782 devices running firmware version v1.01.
Attackers can exploit CVE-2025-25896 by sending specially crafted packets containing malicious destination, netmask, and gateway parameters.