Critical D-Link 0-click Vulnerability Allows Remote Attackers to Crash the Server

A critical stack-based buffer overflow in the D-Link DIR-825 Rev.B 2.10 router firmware allows unauthenticated, zero-click remote attackers to crash the device’s HTTP server.  Tracked as CVE-2025-7206, the flaw resides in the router’s httpd binary and stems from improper handling of the language parameter in the switch_language.cgi endpoint.  Exploitation requires no valid credentials or user […]

The post Critical D-Link 0-click Vulnerability Allows Remote Attackers to Crash the Server appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: