TopVuln

High-risk vulnerability digests

CVE-2026-7856

  • HIGH

cna@vuldb.com

Details

CVSS v3
7.2
CVSS v4
7.3
CVSS v2
8.3
NVD published
2026-05-05 20:16:41
EPSS
0.1% probability · 29.0th percentile — 2026-05-07
Affected versions
D-Link DI-8100 firmware 16.07.26A1
Summary
This buffer overflow vulnerability affects the web management interface of D-Link DI-8100, a widely deployed entry-level multi-WAN router for small businesses. The flaw exists in the /url_member.asp file, where improper input validation of the `Name` request argument allows malicious actors to trigger buffer overflow. Remote attackers can exploit this flaw to execute arbitrary code or crash the affected device.
Remediation
Apply the latest official firmware update from D-Link for DI-8100 devices if a patched version is available. Restrict access to the web management interface to only trusted internal IP addresses. Disable remote management functionality if it is not required for operations.
Exploit info
This exploit has been publicly disclosed, with references to this issue documented in trusted public vulnerability databases. You may check Exploit-DB or GitHub for potential exploit details.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.