Description
D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the fn parameter in the tgfile_htm function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Firmware Update
AI Analysis

Impact

The DI‑8300 firmware version 16.07.26A1 contains a classic buffer overflow in the tgfile_htm function, triggered by an overflow of the fn parameter. The overflow can crash the web management process, resulting in a loss of availability. This exposed weakness is a classic example of CWE‑120. While the vulnerability does not directly expose data or allow code execution, it can be used by attackers to render the device unusable, disrupting services that depend on it.

Affected Systems

The affected vendor is D-Link, model DI‑8300, firmware build 16.07.26A1. No other versions or models are listed. The vulnerability is limited to this specific device build.

Risk and Exploitability

The CVSS score of 7.5 indicates a high impact severity, and the EPSS score of less than 1% suggests that current exploitation activity is low. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote access to the device’s web interface, but the description does not specify authentication requirements. Because it is a Denial‑of‑Service flaw, the risk is primarily to availability and can be mitigated by keeping the device offline or limiting its exposure.

Generated by OpenCVE AI on April 13, 2026 at 15:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device firmware to a version that contains the patch for the tgfile_htm buffer overflow.
  • Restrict access to the device’s management web interface to trusted networks or VPN only to reduce exposure to unauthenticated attackers.
  • Monitor the device for repeated crashes or reboots that could indicate a DoS attempt and investigate accordingly.
  • If an update is not available, isolate the device from the internet or block HTTP traffic to the tgfile_htm endpoint to prevent exploitation.

Generated by OpenCVE AI on April 13, 2026 at 15:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title D-Link DI-8300 Buffer Overflow Causing DoS

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Denial of Service via Buffer Overflow in D-Link DI-8300 Firmware
Weaknesses CWE-119

Fri, 10 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink di-8300 Firmware
CPEs cpe:2.3:h:dlink:di-8300:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8300_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink di-8300 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Denial of Service via Buffer Overflow in D-Link DI-8300 Firmware
Weaknesses CWE-119

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8300
Vendors & Products Dlink
Dlink di-8300

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the fn parameter in the tgfile_htm function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
References

Subscriptions

Dlink Di-8300 Di-8300 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-10T15:42:43.981Z

Reserved: 2025-04-22T00:00:00.000Z

Link: CVE-2025-45059

cve-icon Vulnrichment

Updated: 2026-04-10T13:08:08.027Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T18:24:45.840

Modified: 2026-04-10T21:15:23.283

Link: CVE-2025-45059

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:40:46Z

Weaknesses