Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper validation of user input in the qj.asp endpoint.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow vulnerability exists in the qj.asp endpoint of the D‑Link DI‑8003 router firmware 16.07.26A1. Improper input validation allows an attacker to overflow a memory buffer, potentially leading to remote code execution or denial of service. The flaw is categorized as a stack‑based buffer overflow (CWE‑120).

Affected Systems

The affected device is the D‑Link DI‑8003 router running firmware version 16.07.26A1. Users of this product should verify their firmware version and consult D‑Link for updates.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.5, indicating high severity, but an EPSS score of less than 1% suggests low exploitation likelihood. It is not listed in the CISA KEV catalog. The attack would likely be performed remotely over the network via the web‑based qj.asp interface, requiring network connectivity to the device and making the device a potential target for remote attackers.

Generated by OpenCVE AI on April 13, 2026 at 15:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the D‑Link website or support portal for an updated firmware version that addresses the buffer overflow flaw.
  • If an updated firmware is unavailable, consider upgrading to a newer model or applying a vendor‑released patch when it becomes available.
  • Until a patch is applied, restrict network access to the device’s management interface or block the qj.asp endpoint using a firewall or access control list.
  • Continuously monitor the device logs for suspicious activity and review security advisories for new information.

Generated by OpenCVE AI on April 13, 2026 at 15:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 16:00:00 +0000


Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 Firmware via qj.asp Endpoint

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 qj.asp Endpoint Enables Remote Code Execution
Weaknesses CWE-119

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8003
Dlink di-8003 Firmware
CPEs cpe:2.3:h:dlink:di-8003:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8003_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink di-8003
Dlink di-8003 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link di-8003
Vendors & Products D-link
D-link di-8003

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 qj.asp Endpoint Enables Remote Code Execution
Weaknesses CWE-119
CWE-120

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper validation of user input in the qj.asp endpoint.
References

Subscriptions

D-link Di-8003
Dlink Di-8003 Di-8003 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-22T15:24:39.115Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50644

cve-icon Vulnrichment

Updated: 2026-04-10T13:12:09.005Z

cve-icon NVD

Status : Modified

Published: 2026-04-08T19:24:15.103

Modified: 2026-04-22T16:16:48.560

Link: CVE-2025-50644

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:40:39Z

Weaknesses