Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-25696 | D-Link DI-8100 16.07.26A1 is vulnerable to Buffer Overflow via the en`, `val and id parameters in the qj_asp function. This vulnerability allows authenticated attackers to cause a Denial of Service (DoS) by sending crafted GET requests with overly long values for these parameters. |
Wed, 01 Oct 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink di-8100 Dlink di-8100 Firmware |
|
| CPEs | cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink di-8100 Dlink di-8100 Firmware |
Mon, 25 Aug 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link di-8100 |
|
| Vendors & Products |
D-link
D-link di-8100 |
Mon, 25 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-120 | |
| Metrics |
cvssV3_1
|
Mon, 25 Aug 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | D-Link DI-8100 16.07.26A1 is vulnerable to Buffer Overflow via the en`, `val and id parameters in the qj_asp function. This vulnerability allows authenticated attackers to cause a Denial of Service (DoS) by sending crafted GET requests with overly long values for these parameters. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-25T14:50:35.198Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-51281
Updated: 2025-08-25T14:45:29.754Z
Status : Analyzed
Published: 2025-08-25T15:15:40.157
Modified: 2025-10-01T20:00:01.260
Link: CVE-2025-51281
No data.
OpenCVE Enrichment
Updated: 2025-08-25T21:53:00Z
EUVD