Skip to content
CVSS 8.8 · HIGH

CVE-2026-7855

A vulnerability was detected in D-Link DI-8100 16.07.26A1. Affected by this issue is the function tggl_asp of the file /tggl.asp of the component HTTP Request Handler. Performing a manipulation of the argument Name results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

Ver en NVD

Análisis

This is a buffer overflow vulnerability specifically affecting firmware for a D-Link DI-8100 router. It falls under vendor-specific hardware/firmware that is not part of the common software development or Linux server stack used by the community.

Severidad

Puntaje: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-119CWE-120

EPSS

Probabilidad de explotación (próx. 30 días): 0.0002 (0.0%)
Percentil: 5.0%
EPSS: 2026-05-06

Afecta

dlink:di-8100_firmwaredlink:di-8100

Descripción técnica

A vulnerability was detected in D-Link DI-8100 16.07.26A1. Affected by this issue is the function tggl_asp of the file /tggl.asp of the component HTTP Request Handler. Performing a manipulation of the argument Name results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

Publicada: 5/5/2026, 19:16:23
Última modificación: 6/5/2026, 17:38:18

Referencias

InicioEventosBlogRecursosEquipo