Description
D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Firmware
AI Analysis

Impact

This vulnerability is a buffer overflow caused by the ip parameter in the ip_position_asp function of the D-Link DI-8300 firmware. An attacker can supply a crafted input that overflows the buffer and causes the device to crash, resulting in a loss of availability. The weakness is a classic buffer copy without bounds checking (CWE-120).

Affected Systems

Only the D-Link DI-8300 model running firmware version 16.07.26A1 is affected. The issue is identified by the CPE entries for the device and its firmware. No other D-Link products or firmware versions are indicated.

Risk and Exploitability

The CVSS score of 7.5 indicates a high risk to availability. The EPSS score is less than 1 percent, suggesting low current exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog, so there is no evidence of widespread active exploitation. Access appears to be remote through the device’s web interface, so an attacker only needs network connectivity to the target device. Because the flaw is a buffer overflow, a remote attacker could trigger the crash without authentication if the function is exposed publicly.

Generated by OpenCVE AI on April 10, 2026 at 22:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the firmware version currently installed on your DI‑8300 device.
  • Download the latest firmware upgrade from D‑Link’s official website.
  • Apply the firmware update following D‑Link’s installation instructions.
  • Confirm the device reports the updated firmware version after reboot.
  • Monitor device logs for any abnormal activity and ensure web interface security settings are correctly configured.

Generated by OpenCVE AI on April 10, 2026 at 22:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow leading to Denial of Service in D-Link DI-8300 Firmware

Fri, 10 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink di-8300 Firmware
CPEs cpe:2.3:h:dlink:di-8300:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8300_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink di-8300 Firmware

Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D-Link DI-8300 Leading to Denial of Service
Weaknesses CWE-119
CWE-20

Fri, 10 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D-Link DI-8300 Leading to Denial of Service
Weaknesses CWE-119
CWE-20

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8300
Vendors & Products Dlink
Dlink di-8300

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
References

Subscriptions

Dlink Di-8300 Di-8300 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-09T20:50:59.112Z

Reserved: 2025-04-22T00:00:00.000Z

Link: CVE-2025-45057

cve-icon Vulnrichment

Updated: 2026-04-09T20:50:55.372Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T18:24:45.597

Modified: 2026-04-10T21:15:43.683

Link: CVE-2025-45057

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:26:11Z

Weaknesses