ID

VAR-202510-0030


CVE

CVE-2025-11338


TITLE

D-Link DI-7100G C1 openid parameter buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-24761

DESCRIPTION

A flaw has been found in D-Link DI-7100G C1 up to 20250928. This vulnerability affects the function sub_4C0990 of the file /webchat/login.cgi of the component jhttpd. Executing manipulation of the argument openid can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used. The D-Link DI-7100G C1 is an enterprise-class router designed primarily for small and medium-sized businesses. The D-Link DI-7100G C1 suffers from a buffer overflow vulnerability. This vulnerability stems from a failure to properly validate the length of input data in the openid parameter in the /webchat/login.cgi file. An attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service

Trust: 1.44

sources: NVD: CVE-2025-11338 // CNVD: CNVD-2025-24761

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-24761

AFFECTED PRODUCTS

vendor:dlinkmodel:di-7100g c1scope:eqversion:2025-09-28

Trust: 1.0

vendor:d linkmodel:di-7100g c1scope:lteversion:<=20250928

Trust: 0.6

sources: CNVD: CNVD-2025-24761 // NVD: CVE-2025-11338

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-11338
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-11338
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2025-24761
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2025-11338
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-24761
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-11338
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-11338
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-24761 // NVD: CVE-2025-11338 // NVD: CVE-2025-11338

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

sources: NVD: CVE-2025-11338

EXTERNAL IDS

db:NVDid:CVE-2025-11338

Trust: 1.6

db:VULDBid:327221

Trust: 1.0

db:CNVDid:CNVD-2025-24761

Trust: 0.6

sources: CNVD: CNVD-2025-24761 // NVD: CVE-2025-11338

REFERENCES

url:https://vuldb.com/?ctiid.327221

Trust: 1.6

url:https://vuldb.com/?id.327221

Trust: 1.0

url:https://vuldb.com/?submit.664619

Trust: 1.0

url:https://www.dlink.com/

Trust: 1.0

url:https://www.yuque.com/jh0ng/vmpda6/kggo2ngrcphzvwml

Trust: 1.0

sources: CNVD: CNVD-2025-24761 // NVD: CVE-2025-11338

SOURCES

db:CNVDid:CNVD-2025-24761
db:NVDid:CVE-2025-11338

LAST UPDATE DATE

2025-11-20T23:17:01.627000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-24761date:2025-10-24T00:00:00
db:NVDid:CVE-2025-11338date:2025-11-19T21:48:49.203

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-24761date:2025-10-24T00:00:00
db:NVDid:CVE-2025-11338date:2025-10-06T16:15:33.497