Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-4544 | 1 Dlink | 2 Di-8100, Di-8100 Firmware | 2025-05-22 | 6.8 MEDIUM | 6.6 MEDIUM |
A vulnerability was found in D-Link DI-8100 up to 16.07.26A1 and classified as critical. This issue affects some unknown processing of the file /ddos.asp of the component jhttpd. The manipulation of the argument def_max/def_time/def_tcp_max/def_tcp_time/def_udp_max/def_udp_time/def_icmp_max leads to stack-based buffer overflow. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. | |||||
CVE-2025-28395 | 1 Dlink | 2 Di-8100, Di-8100 Firmware | 2025-04-15 | N/A | 7.1 HIGH |
D-LINK DI-8100 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_road_asp function via the host_ip parameter. | |||||
CVE-2025-28398 | 1 Dlink | 2 Di-8100, Di-8100 Firmware | 2025-04-15 | N/A | 7.1 HIGH |
D-LINK DI-8100 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_net_asp function via the remot_ip parameter. | |||||
CVE-2024-44375 | 1 Dlink | 2 Di-8100, Di-8100 Firmware | 2025-03-17 | N/A | 7.5 HIGH |
D-Link DI-8100 v16.07.26A1 has a stack overflow vulnerability in the dbsrv_asp function. | |||||
CVE-2024-7436 | 1 Dlink | 2 Di-8100, Di-8100 Firmware | 2024-09-11 | 6.5 MEDIUM | 8.8 HIGH |
A vulnerability, which was classified as critical, has been found in D-Link DI-8100 16.07. This issue affects the function msp_info_htm of the file msp_info.htm. The manipulation of the argument cmd leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273521 was assigned to this vulnerability. | |||||
CVE-2024-7833 | 1 Dlink | 2 Di-8100, Di-8100 Firmware | 2024-08-19 | 6.5 MEDIUM | 9.8 CRITICAL |
A vulnerability was found in D-Link DI-8100 16.07. It has been classified as critical. This affects the function upgrade_filter_asp of the file upgrade_filter.asp. The manipulation of the argument path leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |