Skip to content
CVSS 8.0 · HIGH

CVE-2026-7069

A security flaw has been discovered in D-Link DIR-825 up to 3.00b32. This impacts the function AddPortMapping of the file upnpsoap.c of the component miniupnpd. Performing a manipulation of the argument NewPortMappingDescription results in buffer overflow. The attack needs to be approached within the local network. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.

View on NVD

Analysis

This is a buffer overflow vulnerability in the firmware of a legacy D-Link consumer router that is now end-of-life. It requires local network access and targets specific hardware not typically used in the professional software development or server management stack.

Severity

Score: 8.0(HIGH)
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: ADJACENT_NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-119CWE-120

EPSS

Probability of exploitation (next 30 days): 0.0007 (0.1%)
Percentile: 20.8%
EPSS: 2026-05-06

Affects

dlink:dir-825_firmwaredlink:dir-825

Technical description

A security flaw has been discovered in D-Link DIR-825 up to 3.00b32. This impacts the function AddPortMapping of the file upnpsoap.c of the component miniupnpd. Performing a manipulation of the argument NewPortMappingDescription results in buffer overflow. The attack needs to be approached within the local network. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.

Published: 4/27/2026, 12:16:21 AM
Last modified: 4/30/2026, 2:08:48 PM

References

HomeEventsBlogResourcesTeam