Impact
The vulnerability is a stack-based buffer overflow in the fn parameter handling of the tgfile_htm function in D‑Link DI‑8300 firmware version 16.07.26A1. An attacker can send a specially crafted input that exceeds the buffer size, causing the router to crash and become inaccessible. The impact is a denial of service; the flaw does not appear to allow code execution or data disclosure.
Affected Systems
The affected device is the D‑Link DI‑8300 router running firmware version 16.07.26A1. No other affected versions are listed in the data; however, the issue may exist in similar firmware revisions.
Risk and Exploitability
No CVSS score or EPSS data are available, but the buffer overflow provides a remote entry point that an attacker could exploit to bring the device down. The risk is elevated for environments that rely on the router for network connectivity, and the lack of a patch in the provided references suggests immediate action is required.
OpenCVE Enrichment