TopVuln

High-risk vulnerability digests

CVE-2026-7248

  • HIGH

Details

CVSS v3
9.8
CVSS v4
8.9
CVSS v2
10.0
NVD published
2026-04-28 09:16:18
EPSS
<0.1% probability · 8.3th percentile — 2026-05-12
Affected versions
D-Link DI-8100 firmware 16.07.26A1
Summary
This is a remote buffer overflow vulnerability affecting the popular D-Link DI-8100 network router. Remote attackers can trigger memory corruption by sending a crafted request with a maliciously modified fn parameter to the tgfile.htm endpoint. Successful exploitation can lead to full remote code execution on the affected device.
Remediation
Check D-Link's official support portal for the latest firmware update for the DI-8100 series. If no patch is available, restrict external access to the affected device and segment it from public untrusted networks.
Exploit info
This exploit has been publicly disclosed, with references to this issue documented in trusted public vulnerability databases. You may check Exploit-DB or GitHub for potential exploit details.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.