Impact
The vulnerability is a buffer overflow triggered by an attacker supplying a crafted "ip" parameter to the ip_position_asp function in the D‑Link DI‑8300 firmware. This overflow allows the attacker to overrun memory boundaries and crash the device, resulting in a denial of service. The weakness corresponds to improper buffer bounds checks and input validation issues.
Affected Systems
The affected device is the D‑Link DI‑8300, specifically firmware version 16.07.26A1. No other vendors or products are listed.
Risk and Exploitability
The risk is classified as a denial of service; it can be triggered by sending a specially constructed request to the vulnerable function, suggesting a network-based attack vector. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, implying current exploitation evidence is limited. The absence of a public CVSS score makes the severity difficult to quantify, but the impact can disrupt networked services until the device is rebooted or patched.
OpenCVE Enrichment