CVE Alert: CVE-2025-11408 – D-Link – DI-7001 MINI
CVE-2025-11408
A security vulnerability has been detected in D-Link DI-7001 MINI 24.04.18B1. The affected element is an unknown function of the file /dbsrv.asp. Such manipulation of the argument str leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
AI Summary Analysis
Risk verdict
High risk: remote, unauthenticated exploitation is possible with publicly available PoC; treat as priority given active disclosure.
Why this matters
The vulnerability enables memory corruption and potential arbitrary command execution on affected devices with network access but no user action. Impact is high across confidentiality, integrity and availability, creating a hard-to-detect foothold that attackers could reuse for lateral movement within LANs or to disrupt services.
Most likely attack path
Exploitation requires network access with low complexity and low privileges, and no UI interaction. An attacker can target the /dbsrv.asp handler with crafted input to trigger a buffer overflow, achieving remote code execution and full device compromise, consistent with high-impact CVSS outcomes. Exploit activity may be observable as abnormal memory faults, device reboots, or unexpected command execution patterns.
Who is most exposed
D-Link DI-7001 MINI deployments at the network edge (home/SMB gateways) with internet-facing or poorly restricted remote management interfaces are most at risk, especially on older firmware.
Detection ideas
- Repeated requests to /dbsrv.asp with anomalous or oversized str parameters.
- Web server logs showing unusual query strings or overflow-related error messages.
- Sudden device reboots, crashes, or kernel/memory corruption traces.
- Unauthorised or unusual commands appearing on the device console or management interface.
- Indicators matching public PoC payload patterns.
Mitigation and prioritisation
- Patch to the vendor’s latest firmware (e.g., 24.04.18B1 or newer) and verify successful update.
- If patching is slow, disable or tightly restrict remote management interfaces; otherwise implement strict access controls and network segmentation.
- Apply firewall rules to limit WAN access to trusted sources; monitor for anomalous /dbsrv.asp activity.
- Plan and document a maintenance window for upgrade; ensure backups and rollback procedures.
- If KEV is true or EPSS ≥ 0.5, treat as priority 1. Absent those indicators, maintain high-priority remediation.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.