CVE Alert: CVE-2025-11338 – D-Link – DI-7100G C1

CVE-2025-11338

HIGHNo exploitation known

A flaw has been found in D-Link DI-7100G C1 up to 20250928. This vulnerability affects the function sub_4C0990 of the file /webchat/login.cgi of the component jhttpd. Executing manipulation of the argument openid can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

CVSS v3.1 (8.8)
Vendor
D-Link
Product
DI-7100G C1
Versions
20250928
CWE
CWE-120, Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-10-06T16:02:08.398Z
Updated
2025-10-06T17:16:48.402Z

AI Summary Analysis

Risk verdict

High risk of remote code execution on affected devices due to a buffer overflow in a web CGI component; exploit is public and can be used without user interaction.

Why this matters

An attacker could gain full control of the device, persist, and pivot to adjacent network assets, potentially exfiltrating data or disrupting services. The high impact combined with a publicly available exploit raises the likelihood of automated scanning and weaponisation.

Most likely attack path

  • Remote, network-based exploitation targeting an exposed login CGI interface.
  • Requires low attacker privileges to initiate, with no user interaction, and can lead to total compromise via memory corruption.
  • Given the web-facing vector, firewall/WAF bypass and lateral movement within trusted segments are plausible if the device is accessible from the Internet or unsegmented networks.

Who is most exposed

Devices with openly reachable management interfaces or WAN-facing admin access in SMB/remote office deployments are at greatest risk; legacy or end-of-life devices in consumer-grade or small-business networks are common in this pattern.

Detection ideas

  • Look for a surge in remote login.cgi errors or crashes on jhttpd.
  • Unusual process activity or memory crash dumps related to the web server.
  • Access patterns showing long or malformed openid parameters in login requests.
  • Alert on known exploit payload signatures or IOCs associated with this CVE.
  • Correlated anomalous network traffic from management interfaces.

Mitigation and prioritisation

  • Apply vendor firmware update that patches the jhttpd buffer overflow; treat as high priority given public PoC and high impact.
  • Restrict remote access to management interfaces (IP allowlists, VPN-only access); disable unnecessary remote administration.
  • Implement network segmentation and robust logging; enable anomaly detection for web CGI endpoints.
  • If patching is delayed, implement compensating controls (WAF rules, strict input validation, disable openid parameter exposure where feasible).
  • Change-management: schedule firmware upgrade as urgent, with rollback plan and test in a staging environment.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.