Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21897 | A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. This affects an unknown part of the file /menu_nat.asp of the component HTTP Request Handler. The manipulation of the argument out_addr/in_addr/out_port/proto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
Wed, 23 Jul 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink di-8100 Dlink di-8100 Firmware |
|
| CPEs | cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink di-8100 Dlink di-8100 Firmware |
Fri, 18 Jul 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. This affects an unknown part of the file /menu_nat.asp of the component HTTP Request Handler. The manipulation of the argument out_addr/in_addr/out_port/proto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | D-Link DI-8100 HTTP Request menu_nat.asp stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-07-22T15:02:15.795Z
Reserved: 2025-07-18T07:36:19.458Z
Link: CVE-2025-7790
No data.
Status : Analyzed
Published: 2025-07-18T16:15:31.707
Modified: 2025-07-23T16:43:16.823
Link: CVE-2025-7790
No data.
OpenCVE Enrichment
Updated: 2025-07-21T15:17:07Z
EUVD