Impact
A buffer overflow vulnerability exists in the /tggl.asp endpoint of the D‑Link DI‑8003 router due to inadequate input validation. Malicious data sent to this endpoint can overwrite memory and potentially allow an attacker to execute arbitrary code on the device. Such an attack would compromise confidentiality, integrity, and availability of the network equipment and could be leveraged to pivot to other systems within the local network.
Affected Systems
The affected product is the D‑Link DI‑8003 router running firmware version 16.07.26A1. No other vendors or product variations are listed as impacted within the available data.
Risk and Exploitability
The CVSS score is not provided, but buffer overflow vulnerabilities are generally considered high‑severity. There is no EPSS score and the vulnerability is not listed in the CISA KEV catalog, indicating that widespread exploitation has not been documented. The likely attack vector is over the network through a crafted HTTP request to /tggl.asp, but the exact exploitation details are not supplied.
OpenCVE Enrichment