Severity
7.4HIGH
EPSS
0.3%
top 47.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 4
Latest updateSep 11

Description

A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5d-link/di-840016.07.26A1
NVDdlink/di-8400_firmware16.07.26a1

🔴Vulnerability Details

2
GHSA
GHSA-pmpm-w6cf-w2p8: A weakness has been identified in D-Link DI-8400 162025-09-04
CVEList
D-Link DI-8400 yyxz.asp yyxz_dlink_asp stack-based overflow2025-09-03

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS D-Link yyxz.asp id Parameter Buffer Overflow Attempt (CVE-2025-9938)2025-09-11
CVE-2025-9938 (HIGH CVSS 7.4) | A weakness has been identified in D | cvebase.io