Impact
The vulnerability is a classic stack buffer overflow caused by an improperly handled Name parameter in the tggl_asp function of the /tggl.asp HTTP request handler on the DI‑8100. If successfully exploited, an attacker can overwrite control data and execute arbitrary code, leading to full device compromise. The flaw is classified under CWE‑119 and CWE‑120.
Affected Systems
The affected product is the D‑Link DI‑8100 router running firmware 16.07.26A1. No other versions or vendors are listed, and only the DI‑8100 model is mentioned in the CNA data.
Risk and Exploitability
The CVSS score of 8.7 indicates a high‑severity vulnerability with remote exploitation potential. Exploits are publicly available, and the attack vector is inferred to be remote via HTTP since the flaw is triggered through an HTTP request to /tggl.asp. The EPSS score is not provided, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, but the availability of a public exploit raises the practical risk significantly.
OpenCVE Enrichment