Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-7854

A security vulnerability has been detected in D-Link DI-8100 16.07.26A1. Affected by this vulnerability is the function url_rule_asp of the file /url_rule.asp of the component POST Parameter Handler. Such manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

Ver en NVD

Análisis

This vulnerability affects a specific D-Link DI-8100 router model, involving a remote buffer overflow in its web management interface. Although the severity is high, this is vendor-specific hardware firmware that does not align with the community's focus on software development, Linux servers, or cloud infrastructure.

Severidad

Puntaje: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-119CWE-120

EPSS

Probabilidad de explotación (próx. 30 días): 0.0006 (0.1%)
Percentil: 18.6%
EPSS: 2026-05-06

Afecta

dlink:di-8100_firmwaredlink:di-8100

Descripción técnica

A security vulnerability has been detected in D-Link DI-8100 16.07.26A1. Affected by this vulnerability is the function url_rule_asp of the file /url_rule.asp of the component POST Parameter Handler. Such manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

Publicada: 5/5/2026, 19:16:23
Última modificación: 6/5/2026, 17:39:29

Referencias

InicioEventosBlogRecursosEquipo