Description
A vulnerability was identified in D-Link DIR-825 3.00b32. This affects the function NMBD_process of the file sserver.c of the component nmbd. Such manipulation leads to buffer overflow. The attack can only be initiated within the local network. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-26
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Assess Impact
AI Analysis

Impact

A stack‑based buffer overflow exists in the NMBD_process function of the nmbd component on D‑Link DIR‑825 devices running firmware 3.00b32. The flaw can be triggered from the local network and, if exploited, could allow an attacker to execute arbitrary code on the device, thereby compromising confidentiality, integrity, and availability. The vulnerability is classified as CWE‑119 and CWE‑120.

Affected Systems

The affected product is the D‑Link DIR‑825 router, firmware version 3.00b32 and potentially other versions that are no longer supported by the vendor. No other vendors or product lines are listed.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity, while the EPSS score of less than 1% signals a low current exploitation probability; nonetheless, public exploit code exists. The vulnerability is not listed in the CISA KEV catalog. Because the attack vector is limited to the local network, an attacker must first gain local network access before triggering the buffer overflow to obtain remote code execution on the device.

Generated by OpenCVE AI on April 28, 2026 at 05:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device firmware to a supported, patched version if a newer release from D‑Link addresses the issue.
  • If no firmware update is available, disable the NetBIOS name service and the nmbd service to remove the vulnerable code path.
  • Limit local network access to the router, for example by separating it into its own VLAN or using a firewall to restrict connections to trusted hosts.
  • Monitor the device logs for unexpected local network activity that could indicate exploitation attempts.

Generated by OpenCVE AI on April 28, 2026 at 05:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-825
Dlink dir-825 Firmware
CPEs cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-825_firmware:3.00b32:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-825
Dlink dir-825 Firmware

Tue, 28 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-825
Vendors & Products D-link
D-link dir-825

Mon, 27 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in D-Link DIR-825 3.00b32. This affects the function NMBD_process of the file sserver.c of the component nmbd. Such manipulation leads to buffer overflow. The attack can only be initiated within the local network. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-825 nmbd sserver.c NMBD_process buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:A/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-825
Dlink Dir-825 Dir-825 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:02:41.891Z

Reserved: 2026-04-26T07:37:57.970Z

Link: CVE-2026-7068

cve-icon Vulnrichment

Updated: 2026-04-27T13:02:38.479Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-27T00:16:21.050

Modified: 2026-04-30T14:08:54.790

Link: CVE-2026-7068

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:15:22Z

Weaknesses