Impact
A buffer overflow exists in the /tggl.asp endpoint of D‑Link DI‑8003 firmware 16.07.26A1, which can be triggered by sending input that exceeds the expected size. Because the endpoint fails to validate input, an attacker can overwrite the stack and execute arbitrary code. This allows full remote code execution on the device, compromising confidentiality, integrity, and availability. The weakness is classified as CWE‑120.
Affected Systems
The affected product is the D‑Link DI‑8003 wireless router running firmware version 16.07.26A1. No other versions are explicitly listed, so the risk applies only to devices with this firmware.
Risk and Exploitability
The CVSS base score of 7.5 indicates high severity, yet the EPSS score is below 1%, suggesting that real‑world exploitation is currently rare. The vulnerability is not yet listed in the CISA KEV catalog. The likely attack vector is through the web interface exposed by the device, accessible to attackers who can reach the router over the network. Successful exploitation would grant the attacker full control of the device.
OpenCVE Enrichment