{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7248","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-27T17:44:14.172Z","datePublished":"2026-04-28T08:45:12.356Z","dateUpdated":"2026-04-29T14:21:29.693Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-28T08:45:12.356Z"},"title":"D-Link DI-8100 CGI Endpoint tgfile.htm tgfile_htm buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"D-Link","product":"DI-8100","versions":[{"version":"16.07.26A1","status":"affected"}],"modules":["CGI Endpoint"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in D-Link DI-8100 16.07.26A1. This affects the function tgfile_htm of the file tgfile.htm of the component CGI Endpoint. The manipulation of the argument fn results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"CRITICAL"}},{"cvssV3_1":{"version":"3.1","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV3_0":{"version":"3.0","baseScore":9.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV2_0":{"version":"2.0","baseScore":10,"vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-27T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-27T19:49:23.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"draw (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/359857","name":"VDB-359857 | D-Link DI-8100 CGI Endpoint tgfile.htm tgfile_htm buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/359857/cti","name":"VDB-359857 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/802869","name":"Submit #802869 | D-Link DI-8100 16.07.26A1 Denial of Service","tags":["third-party-advisory"]},{"url":"https://github.com/draw-ctf/report/blob/main/DI-8100/DI-8100_tgfile_htm_overflow.md","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-29T14:21:18.566896Z","id":"CVE-2026-7248","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-29T14:21:29.693Z"}}]}}