A vulnerability has been found in D-Link DI-8100 16.07.26A1. Affected by this issue is the function file_exten_asp of the file file_exten.asp of the component File Extension Handler. The manipulation of the argument Name leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/draw-ctf/report/blob/main/DI-8100/file_exten_asp_overflow.md | Exploit Third Party Advisory |
| https://vuldb.com/submit/802868 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/359856 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/359856/cti | Permissions Required VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Apr 2026, 13:09
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Dlink di-8100 Firmware
Dlink di-8100 Dlink |
|
| CPE | cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:* |
|
| References | () https://github.com/draw-ctf/report/blob/main/DI-8100/file_exten_asp_overflow.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/submit/802868 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/359856 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/359856/cti - Permissions Required, VDB Entry | |
| References | () https://www.dlink.com/ - Product |
28 Apr 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-28 09:16
Updated : 2026-04-30 13:09
NVD link : CVE-2026-7247
Mitre link : CVE-2026-7247
CVE.ORG link : CVE-2026-7247
JSON object : View
Products Affected
dlink
- di-8100
- di-8100_firmware
