Impact
A buffer overflow flaw in the D‑Link DI‑8003 router occurs when the routes_static parameter in the /router.asp endpoint receives input that exceeds the allocated buffer. The inadequate validation allows an attacker to inject oversized data, potentially overwriting adjacent memory and enabling the execution of arbitrary code. Exploitation could lead to total device compromise, allowing the attacker to alter configuration, intercept traffic, or use the device as part of a larger attack.
Affected Systems
This issue affects the D‑Link DI‑8003 router running firmware 16.07.26A1. No other product variants or firmware versions are listed as affected in the available information.
Risk and Exploitability
The public CVSS score is not provided, and EPSS data is unavailable. The vulnerability is not listed in CISA’s KEV catalog, suggesting no widely known exploitation yet. However, because the flaw is a classic buffer overflow that can be triggered via an HTTP request to /router.asp, it is likely exploitable by an external attacker with network access to the router’s administrative interface. Until a vendor patch is released, the risk remains significant for any device remaining at the vulnerable firmware level.
OpenCVE Enrichment