Impact
A buffer overflow vulnerability exists in the qj.asp endpoint of the D‑Link DI‑8003 router (firmware 16.07.26A1). Improper input validation allows an attacker to send data that exceeds the allocated buffer, potentially corrupting memory and enabling arbitrary code execution on the device. If exploited, an attacker could gain full control of the router, compromise network traffic, and establish persistence. The weakness aligns with common buffer overflow patterns that threaten confidentiality, integrity, and availability of the affected network.
Affected Systems
The affected system is the D‑Link DI‑8003 router running firmware version 16.07.26A1. No other vendors or versions are listed in the advisory.
Risk and Exploitability
Although CVSS, EPSS, and KEV data are not available, the nature of a network‑accessible buffer overflow usually indicates a high risk of remote exploitation when an attacker can craft a malicious HTTP request to qj.asp. Current references do not indicate a publicly known exploit, but the vulnerability type warrants close scrutiny and timely mitigation. Until a vendor update is released, treat this as a critical flaw due to its remote code execution potential.
OpenCVE Enrichment