Skip to content
CVSS 8.0 · HIGH

CVE-2026-7069

A security flaw has been discovered in D-Link DIR-825 up to 3.00b32. This impacts the function AddPortMapping of the file upnpsoap.c of the component miniupnpd. Performing a manipulation of the argument NewPortMappingDescription results in buffer overflow. The attack needs to be approached within the local network. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.

Ver en NVD

Análisis

This is a buffer overflow vulnerability in the firmware of a legacy D-Link consumer router that is now end-of-life. It requires local network access and targets specific hardware not typically used in the professional software development or server management stack.

Severidad

Puntaje: 8.0(HIGH)
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: ADJACENT_NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-119CWE-120

EPSS

Probabilidad de explotación (próx. 30 días): 0.0007 (0.1%)
Percentil: 20.8%
EPSS: 2026-05-06

Afecta

dlink:dir-825_firmwaredlink:dir-825

Descripción técnica

A security flaw has been discovered in D-Link DIR-825 up to 3.00b32. This impacts the function AddPortMapping of the file upnpsoap.c of the component miniupnpd. Performing a manipulation of the argument NewPortMappingDescription results in buffer overflow. The attack needs to be approached within the local network. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.

Publicada: 27/4/2026, 0:16:21
Última modificación: 30/4/2026, 14:08:48

Referencias

InicioEventosBlogRecursosEquipo