First published: Tue Apr 01 2025(Updated: )
D-LINK DI-8100 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_road_asp function via the host_ip parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DI-8100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-28395 has a high severity rating due to its potential for allowing remote code execution through buffer overflow.
To fix CVE-2025-28395, you should update the D-Link DI-8100 to the latest firmware version that addresses this vulnerability.
CVE-2025-28395 can be exploited through crafted IP packets sent to the vulnerable ipsec_road_asp function, potentially leading to denial of service or unauthorized access.
Users of the D-Link DI-8100 with firmware version 16.07.26A1 are affected by CVE-2025-28395.
CVE-2025-28395 is a buffer overflow vulnerability that occurs due to improper handling of the host_ip parameter in the ipsec_road_asp function.