Impact
The vulnerability is a stack-based buffer overflow in the jingx_asp function triggered by the fx parameter. A crafted input can cause the buffer to overrun, leading the device to crash and restart, which results in loss of availability for connected users. The weakness is CWE-120.
Affected Systems
D-Link DI-8300 routers running firmware version 16.07.26A1 are affected. The flaw is confined to the device’s internal updater or web management subsystem.
Risk and Exploitability
The CVSS v3 score of 7.5 indicates a high severity, while an EPSS score of less than 1% suggests a low probability of widespread exploitation. The vulnerability is not listed in CISA’s KEV catalog. The likely attack path involves remote delivery of an oversized fx parameter to the flashing or management interface, but this is inferred from the wording of the description, as the exact input channel is not explicitly stated.
OpenCVE Enrichment