ID

VAR-202604-1938


CVE

CVE-2025-45059


TITLE

D-Link Corporation of di-8300  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-010676

DESCRIPTION

D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the fn parameter in the tgfile_htm function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. DoS ) may causeInformation handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2025-45059 // JVNDB: JVNDB-2026-010676

AFFECTED PRODUCTS

vendor:dlinkmodel:di-8300scope:eqversion:16.07.26a1

Trust: 1.0

vendor:d linkmodel:di-8300scope: - version: -

Trust: 0.8

vendor:d linkmodel:di-8300scope:eqversion: -

Trust: 0.8

vendor:d linkmodel:di-8300scope:eqversion:di-8300 firmware 16.07.26a1

Trust: 0.8

sources: JVNDB: JVNDB-2026-010676 // NVD: CVE-2025-45059

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-45059
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-010676
value: HIGH

Trust: 0.8

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-45059
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2026-010676
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-010676 // NVD: CVE-2025-45059

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-010676 // NVD: CVE-2025-45059

PATCH

title:Security Bulletin | D-Link GitHubGitHuburl:https://www.dlink.com/en/security-bulletin/

Trust: 0.8

sources: JVNDB: JVNDB-2026-010676

EXTERNAL IDS

db:NVDid:CVE-2025-45059

Trust: 2.6

db:JVNDBid:JVNDB-2026-010676

Trust: 0.8

sources: JVNDB: JVNDB-2026-010676 // NVD: CVE-2025-45059

REFERENCES

url:https://www.dlink.com.cn/techsupport/productinfo.aspx?m=di-8300

Trust: 1.8

url:https://www.dlink.com/en/security-bulletin/

Trust: 1.0

url:https://github.com/xiaotea/iot-vulnerability-collection/blob/main/readme.md

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-45059

Trust: 0.8

sources: JVNDB: JVNDB-2026-010676 // NVD: CVE-2025-45059

SOURCES

db:JVNDBid:JVNDB-2026-010676
db:NVDid:CVE-2025-45059

LAST UPDATE DATE

2026-04-18T00:14:59.939000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-010676date:2026-04-13T02:14:00
db:NVDid:CVE-2025-45059date:2026-04-10T21:15:23.283

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-010676date:2026-04-13T00:00:00
db:NVDid:CVE-2025-45059date:2026-04-08T18:24:45.840