Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper validation of user input in the qj.asp endpoint.
Published: 2026-04-08
Score: n/a
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow vulnerability exists in the qj.asp endpoint of the D‑Link DI‑8003 router (firmware 16.07.26A1). Improper input validation allows an attacker to send data that exceeds the allocated buffer, potentially corrupting memory and enabling arbitrary code execution on the device. If exploited, an attacker could gain full control of the router, compromise network traffic, and establish persistence. The weakness aligns with common buffer overflow patterns that threaten confidentiality, integrity, and availability of the affected network.

Affected Systems

The affected system is the D‑Link DI‑8003 router running firmware version 16.07.26A1. No other vendors or versions are listed in the advisory.

Risk and Exploitability

Although CVSS, EPSS, and KEV data are not available, the nature of a network‑accessible buffer overflow usually indicates a high risk of remote exploitation when an attacker can craft a malicious HTTP request to qj.asp. Current references do not indicate a publicly known exploit, but the vulnerability type warrants close scrutiny and timely mitigation. Until a vendor update is released, treat this as a critical flaw due to its remote code execution potential.

Generated by OpenCVE AI on April 8, 2026 at 20:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the D‑Link website for a firmware update that addresses the qj.asp buffer overflow
  • Apply the latest firmware to the DI‑8003 router as soon as possible
  • If a patch is not yet available, block or restrict inbound traffic to the qj.asp endpoint using a firewall or ACL
  • Ensure that the router runs a unique, strong administrator password and disable remote management unless required

Generated by OpenCVE AI on April 8, 2026 at 20:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link di-8003
Vendors & Products D-link
D-link di-8003

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 qj.asp Endpoint Enables Remote Code Execution
Weaknesses CWE-119
CWE-120

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper validation of user input in the qj.asp endpoint.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-08T17:22:28.881Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50644

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T19:24:15.103

Modified: 2026-04-08T21:26:13.410

Link: CVE-2025-50644

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:22:41Z

Weaknesses