{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7247","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-27T17:43:38.854Z","datePublished":"2026-04-28T08:30:18.587Z","dateUpdated":"2026-04-28T12:19:48.669Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-28T08:30:18.587Z"},"title":"D-Link DI-8100 File Extension file_exten.asp file_exten_asp buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"D-Link","product":"DI-8100","versions":[{"version":"16.07.26A1","status":"affected"}],"modules":["File Extension Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in D-Link DI-8100 16.07.26A1. Affected by this issue is the function file_exten_asp of the file file_exten.asp of the component File Extension Handler. The manipulation of the argument Name leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":7.2,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.2,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":8.3,"vectorString":"AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-27T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-27T19:49:19.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"draw (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/359856","name":"VDB-359856 | D-Link DI-8100 File Extension file_exten.asp file_exten_asp buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/359856/cti","name":"VDB-359856 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/802868","name":"Submit #802868 | D-Link DI-8100 16.07.26A1 Denial of Service","tags":["third-party-advisory"]},{"url":"https://github.com/draw-ctf/report/blob/main/DI-8100/file_exten_asp_overflow.md","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-28T12:18:20.034048Z","id":"CVE-2026-7247","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-28T12:19:48.669Z"}}]}}