Description
D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the fx parameter in the jingx_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Published: 2026-04-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Update
AI Analysis

Impact

A buffer overflow occurs in the D-Link DI-8300 firmware (v16.07.26A1) within the jingx_asp function when parsing the fx parameter supplied via the web interface. Sending an oversized or malformed value can corrupt memory, causing the device to crash and stop responding. The result is a loss of availability for the network appliance, potentially disrupting all services that rely on the router.

Affected Systems

Only the D-Link DI-8300 model running firmware version v16.07.26A1 is known to contain this vulnerability. No other D-Link models or firmware releases are mentioned in the advisory.

Risk and Exploitability

No public exploits or zero-day reports are documented, and the vulnerability is not listed in the KEV catalog. The EPSS score is unavailable, so the exact likelihood of exploitation is uncertain. However, because the flaw can be triggered remotely via the web interface, an attacker who gains network access could evade monitoring and cause a denial of service. The high impact on availability makes it a priority to remediate when a patch becomes available.

Generated by OpenCVE AI on April 8, 2026 at 19:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check D-Link’s security bulletin and product page for firmware updates that address this issue.
  • Download the latest firmware from the official source, verify its checksum, and install it on the affected device.
  • Reset the router to factory defaults after updating and confirm the web interface is functioning normally.
  • If no updated firmware is available, disable the device’s web management interface or restrict it to a trusted local network subnet.
  • Maintain current backups of configuration settings before applying firmware changes.
  • Continuously monitor network traffic for repeated DoS attempts to detect possible exploitation.

Generated by OpenCVE AI on April 8, 2026 at 19:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8300 Web Interface Causes Denial of Service
Weaknesses CWE-120

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8300
Vendors & Products Dlink
Dlink di-8300

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the fx parameter in the jingx_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-08T17:05:50.662Z

Reserved: 2025-04-22T00:00:00.000Z

Link: CVE-2025-45058

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T18:24:45.723

Modified: 2026-04-08T21:26:13.410

Link: CVE-2025-45058

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:44:42Z

Weaknesses