CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Description
D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the fn parameter in the tgfile_htm function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Analysis
Buffer overflow in D-Link DI-8300 router firmware v16.07.26A1 enables unauthenticated remote attackers to trigger denial of service conditions via malformed input to the fn parameter in tgfile_htm function. Network-accessible attack vector requires no privileges or user interaction. CVSS 7.5 (High) reflects availability impact. No public exploit identified at time of analysis. Low observed exploitation activity (EPSS 0.02%).
Technical Context
CWE-120 classic buffer overflow in tgfile_htm handler function fails to validate fn parameter length before memory copy operation. Network-reachable attack surface (AV:N) and low complexity (AC:L) indicate direct HTTP request exploitation without authentication barriers (PR:N). Memory corruption limited to availability disruption (A:H), suggesting stack/heap exhaustion rather than control-flow hijack.
Affected Products
D-Link DI-8300 industrial-grade router, firmware version 16.07.26A1. Vendor: D-Link Corporation. Specific CPE unavailable from authoritative sources. Single confirmed vulnerable version with no indication of broader version range impact.
Remediation
No vendor-released patch identified at time of analysis. D-Link has not published firmware updates addressing CVE-2025-45059 per security bulletin review (https://www.dlink.com/en/security-bulletin/). Recommended immediate mitigations: (1) restrict network access to DI-8300 management interface via firewall rules limiting source IPs to trusted administrative subnets, (2) disable remote management features if operationally feasible, (3) implement intrusion prevention signatures detecting abnormal HTTP parameter lengths to tgfile_htm endpoint, (4) monitor vendor advisory page for forthcoming patches. Organizations requiring continuous availability should evaluate alternative routing hardware until remediation becomes available. Contact D-Link technical support for product-specific guidance and patch roadmap: https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DI-8300
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209311