Impact
A buffer overflow exists within the sprintf call in the /auto_reboot.asp handler of the D‑Link DI‑8100 router. By sending crafted enable/time parameters, an attacker can overwrite adjacent memory, which can lead to arbitrary code execution under the privileges of the router’s HTTP service. The description notes that this can be done remotely and that public exploit code is available.
Affected Systems
The issue affects D‑Link DI‑8100 routers with firmware 16.07.26A1 only; no other versions or models are mentioned. The vendor product is specifically the DI‑8100 router.
Risk and Exploitability
The CVSS score of 9.3 classifies the flaw as critical. EPSS is not reported, but the public availability of exploit code and remote HTTP attack vector raise the real‑world risk. The vulnerability is not yet in the CISA KEV list; however, its severity and openness make it an attractive target for attackers.
OpenCVE Enrichment