EUVD-2025-209311

| CVE-2025-45059 HIGH
2026-04-08 mitre
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 18:16 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 18:16 euvd
EUVD-2025-209311
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the fn parameter in the tgfile_htm function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

Analysis

Buffer overflow in D-Link DI-8300 router firmware v16.07.26A1 enables unauthenticated remote attackers to trigger denial of service conditions via malformed input to the fn parameter in tgfile_htm function. Network-accessible attack vector requires no privileges or user interaction. CVSS 7.5 (High) reflects availability impact. No public exploit identified at time of analysis. Low observed exploitation activity (EPSS 0.02%).

Technical Context

CWE-120 classic buffer overflow in tgfile_htm handler function fails to validate fn parameter length before memory copy operation. Network-reachable attack surface (AV:N) and low complexity (AC:L) indicate direct HTTP request exploitation without authentication barriers (PR:N). Memory corruption limited to availability disruption (A:H), suggesting stack/heap exhaustion rather than control-flow hijack.

Affected Products

D-Link DI-8300 industrial-grade router, firmware version 16.07.26A1. Vendor: D-Link Corporation. Specific CPE unavailable from authoritative sources. Single confirmed vulnerable version with no indication of broader version range impact.

Remediation

No vendor-released patch identified at time of analysis. D-Link has not published firmware updates addressing CVE-2025-45059 per security bulletin review (https://www.dlink.com/en/security-bulletin/). Recommended immediate mitigations: (1) restrict network access to DI-8300 management interface via firewall rules limiting source IPs to trusted administrative subnets, (2) disable remote management features if operationally feasible, (3) implement intrusion prevention signatures detecting abnormal HTTP parameter lengths to tgfile_htm endpoint, (4) monitor vendor advisory page for forthcoming patches. Organizations requiring continuous availability should evaluate alternative routing hardware until remediation becomes available. Contact D-Link technical support for product-specific guidance and patch roadmap: https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DI-8300

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2025-209311 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy