Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper input validation in the vlan_name parameter in the /shut_set.asp endpoint.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Buffer Overflow
Action: Update Firmware
AI Analysis

Impact

A buffer overflow occurs when an attacker supplies an overly long vlan_name string to the /shut_set.asp endpoint of the D‑Link DI‑8003 router. The lack of bounds checking corrupts the device’s memory and can allow execution of arbitrary code. This enables an attacker to gain full control of the router and compromise confidentiality, integrity, and availability of the network services on it.

Affected Systems

D‑Link DI‑8003 router running firmware version 16.07.26A1. No other affected versions are listed.

Risk and Exploitability

The CVSS score of 7.5 reflects high severity. An EPSS rating below 1% indicates that exploitable activity is currently uncommon, and the vulnerability is not listed in the CISA KEV catalog. Attackers would reach the flaw remotely by sending crafted requests to /shut_set.asp, potentially through the web management interface. Because the exploit can trigger arbitrary code execution, it should be treated as a high‑risk issue despite the low current exploitation probability.

Generated by OpenCVE AI on April 13, 2026 at 15:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the DI‑8003 firmware to the latest release that addresses this flaw.
  • If an immediate firmware update is not possible, restrict external access to the device’s management interface, preferably through a VPN or limited IP whitelist.
  • Disable or block the /shut_set.asp endpoint if configuration changes can be made through another interface.
  • Monitor the device’s logs for unusual access or traffic patterns to /shut_set.asp.
  • Apply additional network segmentation so that the router remains isolated from critical infrastructure.

Generated by OpenCVE AI on April 13, 2026 at 15:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 16:00:00 +0000


Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 VLAN Name Parameter via /shut_set.asp

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 /shut_set.asp vlan_name Parameter
Weaknesses CWE-20

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink di-8003 Firmware
CPEs cpe:2.3:h:dlink:di-8003:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8003_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink di-8003 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 /shut_set.asp vlan_name Parameter
First Time appeared Dlink
Dlink di-8003
Weaknesses CWE-120
CWE-20
Vendors & Products Dlink
Dlink di-8003

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper input validation in the vlan_name parameter in the /shut_set.asp endpoint.
References

Subscriptions

Dlink Di-8003 Di-8003 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-22T15:29:50.837Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50649

cve-icon Vulnrichment

Updated: 2026-04-10T15:37:21.656Z

cve-icon NVD

Status : Modified

Published: 2026-04-08T19:24:15.687

Modified: 2026-04-22T16:16:49.637

Link: CVE-2025-50649

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:40:35Z

Weaknesses