Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-28424 | A vulnerability was found in D-Link DI-8100 up to 20250523. It has been classified as critical. Affected is the function httpd_get_parm of the file /login.cgi of the component jhttpd. The manipulation of the argument notify leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink di-8100 Dlink di-8100 Firmware |
|
| CPEs | cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8100_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink di-8100 Dlink di-8100 Firmware |
Tue, 27 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 May 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in D-Link DI-8100 up to 20250523. It has been classified as critical. Affected is the function httpd_get_parm of the file /login.cgi of the component jhttpd. The manipulation of the argument notify leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. | |
| Title | D-Link DI-8100 jhttpd login.cgi httpd_get_parm stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-05-27T13:33:20.348Z
Reserved: 2025-05-26T18:02:29.309Z
Link: CVE-2025-5228
Updated: 2025-05-27T13:33:12.438Z
Status : Analyzed
Published: 2025-05-27T04:15:47.007
Modified: 2025-07-15T17:24:55.217
Link: CVE-2025-5228
No data.
OpenCVE Enrichment
Updated: 2025-06-24T09:44:15Z
EUVD