Skip to content
CVSS 8.8 · HIGH

CVE-2026-7855

A vulnerability was detected in D-Link DI-8100 16.07.26A1. Affected by this issue is the function tggl_asp of the file /tggl.asp of the component HTTP Request Handler. Performing a manipulation of the argument Name results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

View on NVD

Analysis

This is a buffer overflow vulnerability specifically affecting firmware for a D-Link DI-8100 router. It falls under vendor-specific hardware/firmware that is not part of the common software development or Linux server stack used by the community.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-119CWE-120

EPSS

Probability of exploitation (next 30 days): 0.0002 (0.0%)
Percentile: 5.0%
EPSS: 2026-05-06

Affects

dlink:di-8100_firmwaredlink:di-8100

Technical description

A vulnerability was detected in D-Link DI-8100 16.07.26A1. Affected by this issue is the function tggl_asp of the file /tggl.asp of the component HTTP Request Handler. Performing a manipulation of the argument Name results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

Published: 5/5/2026, 7:16:23 PM
Last modified: 5/6/2026, 5:38:18 PM

References

HomeEventsBlogResourcesTeam