Impact
An overflow occurs in the file_exten_asp function located in file_exten.asp, a File Extension Handler on the D‑Link DI‑8100. When a malicious Name parameter is processed, the input exceeds the allocated buffer, leading to a buffer overflow. This flaw can be exploited from a remote host and can result in the execution of arbitrary code, giving the attacker full control of the router. The vulnerability is listed as a memory corruption (CWE‑119/120) issue.
Affected Systems
The affected device is the D‑Link DI‑8100 router running firmware 16.07.26A1. No other version ranges are documented, so only this build is known to be vulnerable.
Risk and Exploitability
The CVSS score of 8.6 indicates high severity, while the lack of an EPSS score and KEV listing suggests limited public exploitation data. However, the description confirms that a publicly disclosed exploit exists and that remote exploitation is possible. The attack vector is inferred to be remote over the network, likely through the router’s web interface.
OpenCVE Enrichment