Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-7854

A security vulnerability has been detected in D-Link DI-8100 16.07.26A1. Affected by this vulnerability is the function url_rule_asp of the file /url_rule.asp of the component POST Parameter Handler. Such manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

View on NVD

Analysis

This vulnerability affects a specific D-Link DI-8100 router model, involving a remote buffer overflow in its web management interface. Although the severity is high, this is vendor-specific hardware firmware that does not align with the community's focus on software development, Linux servers, or cloud infrastructure.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-119CWE-120

EPSS

Probability of exploitation (next 30 days): 0.0006 (0.1%)
Percentile: 18.6%
EPSS: 2026-05-06

Affects

dlink:di-8100_firmwaredlink:di-8100

Technical description

A security vulnerability has been detected in D-Link DI-8100 16.07.26A1. Affected by this vulnerability is the function url_rule_asp of the file /url_rule.asp of the component POST Parameter Handler. Such manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

Published: 5/5/2026, 7:16:23 PM
Last modified: 5/6/2026, 5:39:29 PM

References

HomeEventsBlogResourcesTeam