CVE-2026-36957
Analyzed Analyzed - Analysis Complete
Denial of Service in Dbit N300 T1 Pro Router via Boa Web Server

Publication date: 2026-04-30

Last updated on: 2026-05-05

Assigner: MITRE

Description
Dbit N300 T1 Pro Easy Setup Wireless Wi-Fi Router V1.0.0 is vulnerable to Denial of Service via the boa web server URI handler. By initiating a high-volume flood of HTTP GET requests to non-existent URIs, an attacker can exhaust critical system resources, including file descriptors and memory buffers. This results in a kernel deadlock or system hang that disables the web management portal and all routing capabilities.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dbitnet dbit_n300_t1_pro_firmware 1.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-36957 is a Denial of Service vulnerability in the Dbit N300 T1 Pro Easy Setup Wireless Wi-Fi Router firmware version V1.0.0. The vulnerability exists in the Boa web server's URI handler, which does not properly manage system resources when flooded with a high volume of HTTP GET requests to non-existent URIs.

This flood of requests exhausts critical system resources such as file descriptors and memory buffers, causing a kernel deadlock or system hang. As a result, the router's web management portal and all routing capabilities become unresponsive, requiring a manual reboot to restore functionality.


How can this vulnerability impact me? :

This vulnerability can significantly impact the availability of your Dbit N300 T1 Pro router by causing it to become unresponsive due to resource exhaustion.

  • The router's web management portal will be disabled, preventing administrative access.
  • All routing capabilities of the device will be halted, disrupting network connectivity.
  • Recovery requires a manual reboot, which may cause downtime and service interruption.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for a high volume of HTTP GET requests to non-existent URIs on the Dbit N300 T1 Pro Easy Setup Wireless Wi-Fi Router running firmware version V1.0.0. An unusual flood of such requests may indicate an ongoing attack exploiting the Boa web server URI handler.

A proof of concept involves spawning multiple threads to send requests to non-existent URIs, which causes the router to crash. To detect this, you can use network monitoring tools or commands that capture HTTP traffic and analyze request patterns.

  • Use tcpdump or Wireshark to capture HTTP GET requests and filter for requests to non-existent URIs.
  • Example tcpdump command: tcpdump -i <interface> 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' -w capture.pcap
  • Analyze captured traffic for repeated GET requests to unusual or non-existent paths.
  • Monitor router logs for signs of resource exhaustion or system hangs related to the web management portal becoming unresponsive.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing connection rate limiting to prevent high-volume floods of HTTP GET requests to non-existent URIs.

Additional measures involve adding watchdog timers to detect and recover from system hangs and restricting the maximum number of concurrent connections per IP address to reduce resource exhaustion.

If the router becomes unresponsive due to this attack, a manual reboot is required to restore functionality.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in the Dbit N300 T1 Pro Easy Setup Wireless Wi-Fi Router causes a Denial of Service by exhausting system resources, leading to a system hang or kernel deadlock that disables the web management portal and routing capabilities.

This impacts the availability of the device but does not affect confidentiality or integrity of data.

Since the vulnerability does not compromise data confidentiality or integrity, it primarily affects availability requirements in standards like GDPR and HIPAA.

Disruptions in availability could lead to non-compliance with regulations that require continuous access to network services or timely access to data, but there is no direct indication that personal data is exposed or altered.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart