A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. This affects an unknown part of the file /menu_nat.asp of the component HTTP Request Handler. The manipulation of the argument out_addr/in_addr/out_port/proto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Metrics
Affected Vendors & Products
References
History
Wed, 23 Jul 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dlink
Dlink di-8100 Dlink di-8100 Firmware |
|
CPEs | cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:* |
|
Vendors & Products |
Dlink
Dlink di-8100 Dlink di-8100 Firmware |
Fri, 18 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. This affects an unknown part of the file /menu_nat.asp of the component HTTP Request Handler. The manipulation of the argument out_addr/in_addr/out_port/proto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |
Title | D-Link DI-8100 HTTP Request menu_nat.asp stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-07-18T15:32:06.709Z
Updated: 2025-07-22T15:02:15.795Z
Reserved: 2025-07-18T07:36:19.458Z
Link: CVE-2025-7790

No data.

Status : Analyzed
Published: 2025-07-18T16:15:31.707
Modified: 2025-07-23T16:43:16.823
Link: CVE-2025-7790

No data.