Impact
The DI‑8300 firmware version 16.07.26A1 contains a classic buffer overflow in the tgfile_htm function, triggered by an overflow of the fn parameter. The overflow can crash the web management process, resulting in a loss of availability. This exposed weakness is a classic example of CWE‑120. While the vulnerability does not directly expose data or allow code execution, it can be used by attackers to render the device unusable, disrupting services that depend on it.
Affected Systems
The affected vendor is D-Link, model DI‑8300, firmware build 16.07.26A1. No other versions or models are listed. The vulnerability is limited to this specific device build.
Risk and Exploitability
The CVSS score of 7.5 indicates a high impact severity, and the EPSS score of less than 1% suggests that current exploitation activity is low. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote access to the device’s web interface, but the description does not specify authentication requirements. Because it is a Denial‑of‑Service flaw, the risk is primarily to availability and can be mitigated by keeping the device offline or limiting its exposure.
OpenCVE Enrichment