Impact
A buffer overflow occurs in the D-Link DI-8300 firmware (v16.07.26A1) within the jingx_asp function when parsing the fx parameter supplied via the web interface. Sending an oversized or malformed value can corrupt memory, causing the device to crash and stop responding. The result is a loss of availability for the network appliance, potentially disrupting all services that rely on the router.
Affected Systems
Only the D-Link DI-8300 model running firmware version v16.07.26A1 is known to contain this vulnerability. No other D-Link models or firmware releases are mentioned in the advisory.
Risk and Exploitability
No public exploits or zero-day reports are documented, and the vulnerability is not listed in the KEV catalog. The EPSS score is unavailable, so the exact likelihood of exploitation is uncertain. However, because the flaw can be triggered remotely via the web interface, an attacker who gains network access could evade monitoring and cause a denial of service. The high impact on availability makes it a priority to remediate when a patch becomes available.
OpenCVE Enrichment