Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to inadequate input validation in the /tggl.asp endpoint.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow exists in the /tggl.asp endpoint of D‑Link DI‑8003 firmware 16.07.26A1, which can be triggered by sending input that exceeds the expected size. Because the endpoint fails to validate input, an attacker can overwrite the stack and execute arbitrary code. This allows full remote code execution on the device, compromising confidentiality, integrity, and availability. The weakness is classified as CWE‑120.

Affected Systems

The affected product is the D‑Link DI‑8003 wireless router running firmware version 16.07.26A1. No other versions are explicitly listed, so the risk applies only to devices with this firmware.

Risk and Exploitability

The CVSS base score of 7.5 indicates high severity, yet the EPSS score is below 1%, suggesting that real‑world exploitation is currently rare. The vulnerability is not yet listed in the CISA KEV catalog. The likely attack vector is through the web interface exposed by the device, accessible to attackers who can reach the router over the network. Successful exploitation would grant the attacker full control of the device.

Generated by OpenCVE AI on April 10, 2026 at 22:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device firmware to the latest version that addresses the buffer overflow.
  • If no update is available, disable the /tggl.asp endpoint or restrict web‑access to trusted IP addresses.
  • Verify that the device is isolated from untrusted networks and consider applying network segmentation.
  • Monitor network traffic for unusual POST requests to /tggl.asp.
  • Refer to D‑Link's security bulletin for further guidance.

Generated by OpenCVE AI on April 10, 2026 at 22:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 16:00:00 +0000


Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D-Link DI‑8003 /tggl.asp Endpoint

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8003
Dlink di-8003 Firmware
CPEs cpe:2.3:h:dlink:di-8003:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8003_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink di-8003
Dlink di-8003 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link di-8003
Vendors & Products D-link
D-link di-8003

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D-Link DI‑8003 /tggl.asp Endpoint
Weaknesses CWE-120

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to inadequate input validation in the /tggl.asp endpoint.
References

Subscriptions

D-link Di-8003
Dlink Di-8003 Di-8003 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-22T15:28:57.989Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50648

cve-icon Vulnrichment

Updated: 2026-04-10T15:37:22.583Z

cve-icon NVD

Status : Modified

Published: 2026-04-08T19:24:15.570

Modified: 2026-04-22T16:16:49.480

Link: CVE-2025-50648

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:25:53Z

Weaknesses