7.5

CVE-2025-52222

D-Link DI-8003 v16.07.26A1, DI-8500 v16.07.26A1; DI-8003G v17.12.21A1, DI-8200G v17.12.20A1, DI-8200 v16.07.26A1, DI-8400 v16.07.26A1, DI-8004w v16.07.26A1, DI-8100 v16.07.26A1, and DI-8100G v17.12.20A1 were discovered to contain a buffer overflow via the rd_en, rd_auth, rd_acct, http_hadmin, http_hadminpwd, rd_key, and rd_ip parameters in the radius_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DlinkDi-8100 Firmware Version16.07.26a1
   DlinkDi-8100 Version-
DlinkDi-8100g Firmware Version17.12.20a1
   DlinkDi-8100g Version-
DlinkDi-8004w Firmware Version16.07.26a1
   DlinkDi-8004w Version-
DlinkDi-8003g Firmware Version17.12.21a1
   DlinkDi-8003g Version-
DlinkDi-8003 Firmware Version16.07.26a1
   DlinkDi-8003 Version-
DlinkDi-8500 Firmware Version16.07.26a1
   DlinkDi-8500 Version-
DlinkDi-8200g Firmware Version17.12.20a1
   DlinkDi-8200g Version-
DlinkDi-8200 Firmware Version16.07.26a1
   DlinkDi-8200 Versiona1
DlinkDi-8400 Firmware Version16.07.26a1
   DlinkDi-8400 Versiona1
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.064
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.