Security researchers have reported a critical flaw in D-Link DIR-825 Rev.B routers having firmware version 2.10, allowing remote attackers to crash it without authentication. Tracked as CVE-2025-7206, the flaw affects the router’s httpd binary and can be exploited remotely through the switch_language.cgi endpoint, allowing attackers to crash the device without requiring login credentials. The issue arises from improper handling of the "language" parameter, which is stored in non-volatile memory and later processed by dynamic ASP pages. The vulnerability is caused by insufficient input validation in the sub_410DDC function, where the router accepts an overly long language parameter from a POST request to switch_language.cgi and stores it without enforcing proper length restrictions The value sent by attacker through request is saved to the router's non-volatile memory (nvram). When a user later accesses an ASP page like login.asp, the script tag that references lang_.js causes the router to read the malicious value from memory. The given value is passed in functions like do_ebd_js and cmo_get_cfg, and eventually reaches the vulnerable sub_40bFC4 function. Due to improper input limitation, a buffer overflow occurs, corrupting memory and crashing the router’s httpd web service, which results in a denial-of-service (DoS) condition. No special access is needed to exploit it, and it can be triggered just by being on the same network. The compromised device is no longer supported by D-Link, so users are suggested to restrict network-level controls to limit access to the router's interface, sanitize user input, and monitor for suspicious traffic patterns. While a firmware patch is not yet available, organizations should consider replacing unsupported hardware and use intrusion detection systems to watch for exploit attempts targeting this flaw.
Two high-severity security vulnerabilities have been identified in Composer, posing a risk of arbitrary command execution if exploited. These flaws affect the Perforce VCS (version...
Rockstar Games has confirmed a data breach after the ShinyHunters extortion group leaked stolen data on its leak site. The attackers claim the data was obtained using compromised a...
Microsoft has released its April 2026 Patch Tuesday security updates, addressing 167 vulnerabilities, including two zero-day flaws. Among the 167 vulnerabilities, 8 are classified ...