CVE-2025-52222

EUVD-2025-209315
D-Link DI-8003 v16.07.26A1, DI-8500 v16.07.26A1; DI-8003G v17.12.21A1, DI-8200G v17.12.20A1, DI-8200 v16.07.26A1, DI-8400 v16.07.26A1, DI-8004w v16.07.26A1, DI-8100 v16.07.26A1, and DI-8100G v17.12.20A1 were discovered to contain a buffer overflow via the rd_en, rd_auth, rd_acct, http_hadmin, http_hadminpwd, rd_key, and rd_ip parameters in the radius_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 6%
Affected Products (NVD)
VendorProductVersion
dlinkdi-8100_firmware
16.07.26a1:a1
dlinkdi-8100g_firmware
17.12.20a1:a1
dlinkdi-8004w_firmware
16.07.26a1:a1
dlinkdi-8003g_firmware
17.12.21a1:a1
dlinkdi-8003_firmware
16.07.26a1:a1
dlinkdi-8500_firmware
16.07.26a1:a1
dlinkdi-8200g_firmware
17.12.20a1:a1
dlinkdi-8200_firmware
16.07.26a1:a1
dlinkdi-8400_firmware
16.07.26a1:a1
𝑥
= Vulnerable software versions