CVE-2026-7853

D-Link · DI-8100

D-Link DI-8100 is vulnerable to a remote buffer overflow in the `sprintf` function within the HTTP Handler's `/auto_reboot.asp` script.

Executive summary

A critical buffer overflow in the D-Link DI-8100 router allows remote unauthenticated attackers to execute arbitrary code.

Vulnerability

The vulnerability is a buffer overflow occurring in the sprintf function within the /auto_reboot.asp file of the HTTP Handler component, triggered by improper handling of the enable/time argument.

Business impact

With a CVSS score of 9.8, this flaw allows for Remote Code Execution. Exploitation can lead to full router compromise, providing the attacker with persistent access to the network, the ability to intercept traffic, or redirecting users to malicious sites.

Remediation

Immediate Action: Update the device firmware to the latest version. If no update is available, disable the web-based management interface.

Proactive Monitoring: Monitor logs for abnormal reboot requests or suspicious HTTP traffic directed at the router's management interface.

Compensating Controls: Use firewall rules to restrict access to the web management interface to trusted internal IP addresses only.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

Due to the public availability of exploit code, this router is at extreme risk. If a firmware update cannot be applied immediately, the router's management interface must be taken offline or restricted to trusted networks to prevent compromise.