TopVuln

High-risk vulnerability digests

CVE-2025-52222

  • HIGH

cve@mitre.org

Details

CVSS v3
7.5
NVD published
2026-04-08 18:24:51
Affected versions
cpe:2.3:o:dlink:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8100g_firmware:17.12.20a1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-8100g:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8004w_firmware:16.07.26a1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-8004w:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8003g_firmware:17.12.21a1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-8003g:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8003_firmware:16.07.26a1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-8003:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8500_firmware:16.07.26a1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-8500:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8200g_firmware:17.12.20a1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-8200g:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8200_firmware:16.07.26a1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-8200:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8400_firmware:16.07.26a1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-8400:a1:*:*:*:*:*:*:*
Summary
D-Link DI-8003 v16.07.26A1, DI-8500 v16.07.26A1; DI-8003G v17.12.21A1, DI-8200G v17.12.20A1, DI-8200 v16.07.26A1, DI-8400 v16.07.26A1, DI-8004w v16.07.26A1, DI-8100 v16.07.26A1, and DI-8100G v17.12.20A1 were discovered to contain a buffer overflow via the rd_en, rd_auth, rd_acct, http_hadmin, http_hadminpwd, rd_key, and rd_ip parameters in the radius_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
Remediation
Not available in our cache.
Exploit info
Not available in our cache.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.