Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-7853

A weakness has been identified in D-Link DI-8100 16.07.26A1. Affected is the function sprintf of the file /auto_reboot.asp of the component HTTP Handler. This manipulation of the argument enable/time causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.

View on NVD

Analysis

This is a critical buffer overflow affecting a specific D-Link enterprise router model (DI-8100). While the vulnerability allows remote code execution and has a public exploit, the hardware is niche and not commonly used in the software development or server environments relevant to the MexicoDev community.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-119CWE-120

EPSS

Probability of exploitation (next 30 days): 0.0006 (0.1%)
Percentile: 18.6%
EPSS: 2026-05-06

Affects

dlink:di-8100_firmwaredlink:di-8100

Technical description

A weakness has been identified in D-Link DI-8100 16.07.26A1. Affected is the function sprintf of the file /auto_reboot.asp of the component HTTP Handler. This manipulation of the argument enable/time causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.

Published: 5/5/2026, 6:16:04 PM
Last modified: 5/6/2026, 5:40:13 PM

References

HomeEventsBlogResourcesTeam