CVE Alert: CVE-2025-10034 – D-Link – DIR-825
CVE-2025-10034
A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
AI Summary Analysis
Risk verdict
High risk: remote, unauthenticated code execution with a public exploit; attacker exposure is exposed and rapid containment is advised.
Why this matters
The httpd buffer overflow in ping6_response.cg could let an external attacker seize control of the device, corrupt memory, or crash the service with high impact on confidentiality, integrity and availability. Given the device is end-of-life/unsupported, patch availability is uncertain, elevating the risk of continued exploitation or post-compromise activity within connected networks.
Most likely attack path
Remote attacker sends crafted input to the ping6_response.cg endpoint over the network, exploiting the ping6_ipaddr buffer overflow. No user interaction required and only low privileges are necessary, with scope confined to the affected device but high potential for subsequent lateral movement within the local network.
Who is most exposed
Older D-Link DIR-825 units in residential or small business deployments, often exposed to internet-facing management or poorly segmented networks; devices may be running out-of-support firmware, increasing exploitation risk.
Detection ideas
- Unusual GET requests to ping6_response.cg with abnormally long payloads; HTTP 500s or crashes in httpd logs.
- Crashes or restarts of the httpd process, memory corruption symptoms, or segmentation faults.
- Elevated CPU/memory usage on the device after specific network requests.
- IDS/IPS rules flagging attempts to exercise get_ping6_app_stat or related endpoints.
- Unexpected network beaconing or shell-like outbound connections post-compromise.
Mitigation and prioritisation
- Patch/patching reality: if a supported update exists, apply immediately; otherwise replace or retire affected devices.
- Compensating controls: disable remote management; implement strict WAN access controls; network-segment affected devices; enforce firewall rules to block or constrain access to the httpd endpoint.
- Change-management: inventory exposed units, rate-limit or monitor access to management interfaces, confirm device EOS/roadmap with vendor.
- If KEV true or EPSS ≥ 0.5, treat as priority 1.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.