ID

VAR-202604-1753


CVE

CVE-2025-45057


TITLE

D-Link Corporation of di-8300  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-010678

DESCRIPTION

D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DoS ) attacks.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2025-45057 // JVNDB: JVNDB-2026-010678

AFFECTED PRODUCTS

vendor:dlinkmodel:di-8300scope:eqversion:16.07.26a1

Trust: 1.0

vendor:d linkmodel:di-8300scope: - version: -

Trust: 0.8

vendor:d linkmodel:di-8300scope:eqversion: -

Trust: 0.8

vendor:d linkmodel:di-8300scope:eqversion:di-8300 firmware 16.07.26a1

Trust: 0.8

sources: JVNDB: JVNDB-2026-010678 // NVD: CVE-2025-45057

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-45057
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-010678
value: HIGH

Trust: 0.8

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-45057
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2026-010678
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-010678 // NVD: CVE-2025-45057

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-010678 // NVD: CVE-2025-45057

PATCH

title:Security Bulletin | D-Link GitHubGitHuburl:https://www.dlink.com/en/security-bulletin/

Trust: 0.8

sources: JVNDB: JVNDB-2026-010678

EXTERNAL IDS

db:NVDid:CVE-2025-45057

Trust: 2.6

db:JVNDBid:JVNDB-2026-010678

Trust: 0.8

sources: JVNDB: JVNDB-2026-010678 // NVD: CVE-2025-45057

REFERENCES

url:https://www.dlink.com.cn/techsupport/productinfo.aspx?m=di-8300

Trust: 1.8

url:https://www.dlink.com/en/security-bulletin/

Trust: 1.0

url:https://github.com/xiaotea/iot-vulnerability-collection/blob/main/readme.md

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-45057

Trust: 0.8

sources: JVNDB: JVNDB-2026-010678 // NVD: CVE-2025-45057

SOURCES

db:JVNDBid:JVNDB-2026-010678
db:NVDid:CVE-2025-45057

LAST UPDATE DATE

2026-04-16T22:21:51.953000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-010678date:2026-04-13T02:14:00
db:NVDid:CVE-2025-45057date:2026-04-10T21:15:43.683

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-010678date:2026-04-13T00:00:00
db:NVDid:CVE-2025-45057date:2026-04-08T18:24:45.597