Impact
A buffer overflow vulnerability exists in the manufacturer’s DI‑8003 router firmware. Malicious users can send a specially crafted request to the pppoe_list_opt.asp endpoint with an excessively large s parameter value, which overflows a buffer and may allow arbitrary code to run on the device. The result could be loss of confidentiality, integrity, and availability of the router and any network services attached to it.
Affected Systems
The affected device is the D‑Link DI‑8003 router running firmware version 16.07.26A1. No other versions have been identified as vulnerable in the available data.
Risk and Exploitability
The CVSS score is not publicly listed, and the vulnerability is not included in CISA’s KEV catalog, making exact risk assessment difficult. The buffer overflow occurs through a network‑exposed HTTP endpoint, so the likely attack vector is remote over the LAN or WAN. Because buffer overflows are a well‑known high‑risk flaw, the potential for exploitation should be treated as significant until a fix is applied.
OpenCVE Enrichment