CVE Alert: CVE-2025-11408 – D-Link – DI-7001 MINI

CVE-2025-11408

HIGHNo exploitation known

A security vulnerability has been detected in D-Link DI-7001 MINI 24.04.18B1. The affected element is an unknown function of the file /dbsrv.asp. Such manipulation of the argument str leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

CVSS v3.1 (8.8)
Vendor
D-Link
Product
DI-7001 MINI
Versions
24.04.18B1
CWE
CWE-120, Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
Published
2025-10-07T20:32:05.695Z
Updated
2025-10-07T20:32:05.695Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated exploitation is possible with publicly available PoC; treat as priority given active disclosure.

Why this matters

The vulnerability enables memory corruption and potential arbitrary command execution on affected devices with network access but no user action. Impact is high across confidentiality, integrity and availability, creating a hard-to-detect foothold that attackers could reuse for lateral movement within LANs or to disrupt services.

Most likely attack path

Exploitation requires network access with low complexity and low privileges, and no UI interaction. An attacker can target the /dbsrv.asp handler with crafted input to trigger a buffer overflow, achieving remote code execution and full device compromise, consistent with high-impact CVSS outcomes. Exploit activity may be observable as abnormal memory faults, device reboots, or unexpected command execution patterns.

Who is most exposed

D-Link DI-7001 MINI deployments at the network edge (home/SMB gateways) with internet-facing or poorly restricted remote management interfaces are most at risk, especially on older firmware.

Detection ideas

  • Repeated requests to /dbsrv.asp with anomalous or oversized str parameters.
  • Web server logs showing unusual query strings or overflow-related error messages.
  • Sudden device reboots, crashes, or kernel/memory corruption traces.
  • Unauthorised or unusual commands appearing on the device console or management interface.
  • Indicators matching public PoC payload patterns.

Mitigation and prioritisation

  • Patch to the vendor’s latest firmware (e.g., 24.04.18B1 or newer) and verify successful update.
  • If patching is slow, disable or tightly restrict remote management interfaces; otherwise implement strict access controls and network segmentation.
  • Apply firewall rules to limit WAN access to trusted sources; monitor for anomalous /dbsrv.asp activity.
  • Plan and document a maintenance window for upgrade; ensure backups and rollback procedures.
  • If KEV is true or EPSS ≥ 0.5, treat as priority 1. Absent those indicators, maintain high-priority remediation.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.