Impact
A buffer overflow vulnerability exists in the qj.asp endpoint of the D‑Link DI‑8003 router firmware 16.07.26A1. Improper input validation allows an attacker to overflow a memory buffer, potentially leading to remote code execution or denial of service. The flaw is categorized as a stack‑based buffer overflow (CWE‑120).
Affected Systems
The affected device is the D‑Link DI‑8003 router running firmware version 16.07.26A1. Users of this product should verify their firmware version and consult D‑Link for updates.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.5, indicating high severity, but an EPSS score of less than 1% suggests low exploitation likelihood. It is not listed in the CISA KEV catalog. The attack would likely be performed remotely over the network via the web‑based qj.asp interface, requiring network connectivity to the device and making the device a potential target for remote attackers.
OpenCVE Enrichment