Overview
The (non-US) D-Link DI-8100 Wi-Fi Device, all hardware revisions and firmware versions are legacy devices listed below in the table. All hardware revisions have reached their End of Life ("EOL") /End of Service Life ("EOS") Lifecycle. D-Link US recommends that D-Link devices that have reached EOL/EOS be retired and replaced. If outside the US, please get in touch with your regional office for recommendations (LINK).
As a general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products ceases. Please read the information and recommendations below.
3rd Party Report information
Report 1: Reported 07/17/2025
Author(s): XiDP (VulDB User) – VULdb Disclosure
Disclosure: CVE-2025-7762: (Link): DI-8100 HTTP Request menu_nat_more.asp stack-based overflow
Description: A vulnerability, which was classified as critical, has been found in D-Link DI-8100 16.07.26A1. This issue affects some unknown processing of the file /menu_nat_more.asp of the component HTTP Request Handler.
CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
8.7
|
HIGH
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
|
8.8
|
HIGH
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
8.8
|
HIGH
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
9.0
|
—
|
2.0
|
AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR
|
All models, Derivative Models, All Revisions, and All Firmware
Report 2: Reported 07/18/2025
Author(s): XiDP (VulDB User) – VULdb Disclosure
Disclosure: CVE-2025-7790: (Link): DI-8100 HTTP Request menu_nat.asp stack-based overflow
Description: A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. This affects an unknown part of the file /menu_nat.asp of the component HTTP Request Handler. The manipulation of the argument out_addr/in_addr/out_port/proto leads to stack-based buffer overflow.
CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
8.7
|
HIGH
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
|
8.8
|
HIGH
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
8.8
|
HIGH
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
9.0
|
—
|
2.0
|
AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR
|
All models, Derivative Models, All Revisions, and All Firmware
Report 3: Reported 07/20/2025
Author(s): XiDP (VulDB User) – VULdb Disclosure
Disclosure: CVE-2025-7908: (Link): DI-8100 jhttpd ddns.asp sprintf stack-based overflow
Description: A vulnerability was found in D-Link DI-8100 1.0. It has been declared as critical. Affected by this vulnerability is the function sprintf of the file /ddns.asp?opt=add of the component jhttpd.
CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
8.7
|
HIGH
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
|
8.8
|
HIGH
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
8.8
|
HIGH
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
9.0
|
—
|
2.0
|
AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR
|
All models, Derivative Models, All Revisions, and All Firmware
Report 4: Reported 07/20/2025
Author(s): bazhuayu (VulDB User)– VULdb Disclosure
Disclosure: CVE-2025-7911: (Link): DI-8100 jhttpd upnp_ctrl.asp sprintf stack-based overflow
Description: A vulnerability classified as critical was found in D-Link DI-8100 1.0. This vulnerability affects the function sprintf of the file /upnp_ctrl.asp of the component jhttpd. The manipulation of the argument remove_ext_proto/remove_ext_port leads to stack-based buffer overflow.
CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
8.7
|
HIGH
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
|
8.8
|
HIGH
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
8.8
|
HIGH
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
9.0
|
—
|
2.0
|
AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR
|
All models, Derivative Models, All Revisions, and All Firmware
Report 5: Reported 07/14/2025
Author(s): XiDP (VulDB User) – VULdb Disclosure
Disclosure: CVE-2025-7602: (Link): DI-8100 HTTP Request arp_sys.asp stack-based overflow
Description: A vulnerability was found in D-Link DI-8100 16.07.26A1 and classified as critical. This issue affects some unknown processing of the file /arp_sys.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow.
CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
8.6
|
HIGH
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
|
7.2
|
HIGH
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
7.2
|
HIGH
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
8.3
|
—
|
2.0
|
AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR
|
All models, Derivative Models, All Revisions, and All Firmware
Report 6: Reported 07/14/2025
Author(s): XiDP (VulDB User) – VULdb Disclosure
Disclosure: CVE-2025-7603: (Link): DI-8100 HTTP Request arp_sys.asp stack-based overflow
Description: A vulnerability was found in D-Link DI-8100 16.07.26A1 and classified as critical. This issue affects an unknown processing step in the file /arp_sys.asp of the HTTP Request Handler component. The manipulation leads to a stack-based buffer overflow.
CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
8.6
|
HIGH
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
|
7.2
|
HIGH
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
7.2
|
HIGH
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
|
8.3
|
—
|
2.0
|
AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR
|
All models, Derivative Models, All Revisions, and All Firmware
Accused Model(s)
Model
|
Region
|
Hardware Revision
|
End of Service Life
|
Fixed Firmware
|
Legacy Website
|
Last Updated
|
DI-8100
|
All Regions
|
All H/W Revisions
|
5/31/2022
|
Not Available
|
Not Available / Non-US
|
07/31/2025
|
** H/W revision Jx is still available in some non-US regions; it is not affected by this vulnerability.
Recommendation for End-of-Support/End of Life Products
From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to the evolution of technology, market demands, innovations, or product efficiencies based on new technologies, or when the product matures over time and should be replaced by functionally superior technology.
For US Consumer
If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is usually no further extended support or development for it.
Typically, for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support have ceased.
D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please ensure the device has the most recent firmware, frequently update its unique password for web configuration access, and always enable WIFI encryption with a unique password.