Description
A vulnerability has been found in D-Link DI-8100 16.07.26A1. Affected by this issue is the function file_exten_asp of the file file_exten.asp of the component File Extension Handler. The manipulation of the argument Name leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Published: 2026-04-28
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

An overflow occurs in the file_exten_asp function located in file_exten.asp, a File Extension Handler on the D‑Link DI‑8100. When a malicious Name parameter is processed, the input exceeds the allocated buffer, leading to a buffer overflow. This flaw can be exploited from a remote host and can result in the execution of arbitrary code, giving the attacker full control of the router. The vulnerability is listed as a memory corruption (CWE‑119/120) issue.

Affected Systems

The affected device is the D‑Link DI‑8100 router running firmware 16.07.26A1. No other version ranges are documented, so only this build is known to be vulnerable.

Risk and Exploitability

The CVSS score of 8.6 indicates high severity, while the lack of an EPSS score and KEV listing suggests limited public exploitation data. However, the description confirms that a publicly disclosed exploit exists and that remote exploitation is possible. The attack vector is inferred to be remote over the network, likely through the router’s web interface.

Generated by OpenCVE AI on April 28, 2026 at 12:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update for the DI‑8100 that addresses the buffer overflow issue.
  • If an update is not yet available, block or remove remote administrative access that exposes the file_exten.asp interface, for example by disabling remote web management or limiting access to the local network.
  • Configure the router behind a firewall or restrict inbound traffic to its HTTP/HTTPS ports to only trusted IP addresses or VPN endpoints.

Generated by OpenCVE AI on April 28, 2026 at 12:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link di-8100
Vendors & Products D-link
D-link di-8100

Tue, 28 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in D-Link DI-8100 16.07.26A1. Affected by this issue is the function file_exten_asp of the file file_exten.asp of the component File Extension Handler. The manipulation of the argument Name leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
Title D-Link DI-8100 File Extension file_exten.asp file_exten_asp buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 8.3, 'vector': 'AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-28T12:19:48.669Z

Reserved: 2026-04-27T17:43:38.854Z

Link: CVE-2026-7247

cve-icon Vulnrichment

Updated: 2026-04-28T12:19:33.157Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T09:16:18.113

Modified: 2026-04-28T20:25:44.987

Link: CVE-2026-7247

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T12:30:31Z

Weaknesses