{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T12:52:03.706","vulnerabilities":[{"cve":{"id":"CVE-2025-52222","sourceIdentifier":"cve@mitre.org","published":"2026-04-08T18:24:51.373","lastModified":"2026-04-14T15:45:21.273","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"D-Link DI-8003 v16.07.26A1, DI-8500 v16.07.26A1; DI-8003G v17.12.21A1, DI-8200G v17.12.20A1, DI-8200 v16.07.26A1, DI-8400 v16.07.26A1, DI-8004w v16.07.26A1, DI-8100 v16.07.26A1, and DI-8100G v17.12.20A1 were discovered to contain a buffer overflow via the rd_en, rd_auth, rd_acct, http_hadmin, http_hadminpwd, rd_key, and rd_ip parameters in the radius_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:di-8100_firmware:16.07.26a1:*:*:*:*:*:*:*","matchCriteriaId":"4FA39417-3894-4D6D-A899-000F56AA482B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:*","matchCriteriaId":"8D417784-56F2-40AF-8FE8-C00E6F332131"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:di-8100g_firmware:17.12.20a1:*:*:*:*:*:*:*","matchCriteriaId":"A134EE00-C43F-41CC-9F7C-B94EA94E2113"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:di-8100g:-:*:*:*:*:*:*:*","matchCriteriaId":"DAA6037E-C080-4254-BDEC-1B5DFC64B937"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:di-8004w_firmware:16.07.26a1:*:*:*:*:*:*:*","matchCriteriaId":"E568896E-FDFE-4D97-B82E-5E983AE8AF45"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:di-8004w:-:*:*:*:*:*:*:*","matchCriteriaId":"FE1CEDFF-4310-444D-85F9-B93B77D0C73B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:di-8003g_firmware:17.12.21a1:*:*:*:*:*:*:*","matchCriteriaId":"7FCE463D-0777-46D0-A102-81EB20622BA8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:di-8003g:-:*:*:*:*:*:*:*","matchCriteriaId":"47C603E1-32FB-4335-B368-1E95529B3106"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:di-8003_firmware:16.07.26a1:*:*:*:*:*:*:*","matchCriteriaId":"FA25536C-1B96-4611-BF35-A0AD24747929"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:di-8003:-:*:*:*:*:*:*:*","matchCriteriaId":"E6644787-50D7-4190-A2E3-DD54F43AE38C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:di-8500_firmware:16.07.26a1:*:*:*:*:*:*:*","matchCriteriaId":"47EBB0E8-37EF-4D2B-ADB3-1BDEC33829A3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:di-8500:-:*:*:*:*:*:*:*","matchCriteriaId":"157BC421-0A70-4F55-840A-683A27F1BD5B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:di-8200g_firmware:17.12.20a1:*:*:*:*:*:*:*","matchCriteriaId":"759CBE57-D426-4F76-BE51-BBB1276538A5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:di-8200g:-:*:*:*:*:*:*:*","matchCriteriaId":"D8F711B9-4D2E-4FE3-B1DB-68E3F15BCC26"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:di-8200_firmware:16.07.26a1:*:*:*:*:*:*:*","matchCriteriaId":"694649F4-AF9D-456F-AC3E-3848B677013E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:di-8200:a1:*:*:*:*:*:*:*","matchCriteriaId":"95B5091D-76F9-49EC-8D21-A96549078BFB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:di-8400_firmware:16.07.26a1:*:*:*:*:*:*:*","matchCriteriaId":"7293D6F3-30C0-4805-A662-ADAC551BAB7A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:di-8400:a1:*:*:*:*:*:*:*","matchCriteriaId":"75CE4566-1587-4A8E-8D4E-8693149670DF"}]}]}],"references":[{"url":"https://github.com/xiaotea/iot-vulnerability-collection/blob/main/README.md","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.dlink.com/en/security-bulletin/","source":"cve@mitre.org","tags":["Vendor Advisory"]}]}}]}