Impact
A buffer overflow vulnerability exists in D‑Link DI‑8003 firmware 16.07.26A1 due to insufficient input validation on the name parameter in the /qos_type_asp.asp endpoint. The flaw allows an attacker to send malformed data that can write beyond the intended memory boundary, potentially leading to unpredictable program behavior. No specific exploitation outcome is described in the advisory.
Affected Systems
This vulnerability affects D‑Link DI‑8003 routers running firmware 16.07.26A1. The affected systems are the router devices with that specific firmware version; no other firmware revisions or hardware models are mentioned.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity rating. The EPSS score is less than 1%, suggesting low likelihood of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog, implying no known active exploitation. Likely attack vector is an attacker who can reach the router’s web interface, for example from the local network or from an externally exposed management port; this is inferred from the endpoint description. Overall risk is moderate to high, contingent on the presence of the vulnerable router and its exposure to potential attackers.
OpenCVE Enrichment