Impact
The vulnerability is a classic buffer overflow in the /url_member.asp component of the web management interface of the D‑Link DI‑8100 router. Manipulation of the Name input parameter allows an attacker to exceed the allocated buffer, potentially overwriting executable memory and enabling arbitrary code execution. The flaw is triggered remotely, meaning an unauthenticated user can upload a crafted payload via the web interface without requiring prior credentials.
Affected Systems
Affected systems are D‑Link DI‑8100 routers that are running firmware version 16.07.26A1. The vulnerability description references an unknown part of /url_member.asp, implying that this exact firmware build is vulnerable. Administrators should verify that their devices match this revision or are newer.
Risk and Exploitability
The CVSS score of 8.6 indicates a high severity vulnerability, and the existence of a published exploit shows that exploitation can be performed remotely without special prerequisites. The EPSS score is not available, but the public availability of an exploit and the remote, unauthenticated attack vector increase the likelihood of real‑world attacks. The vulnerability is not currently listed in the CISA KEV catalog, yet its severity warrants prompt action.
OpenCVE Enrichment