Description
An issue in D-Link DI-8003 16.07.26A1 related to improper handling of the id parameter in the /saveparm_usb.asp endpoint.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

The D-Link DI-8003 router firmware 16.07.26A1 contains a buffer overflow vulnerability when the id parameter in the /saveparm_usb.asp endpoint is unchecked. Because the input is not validated, an attacker can submit an oversized payload that overflows a stack buffer and potentially inject malicious code. This flaw, classified as a stack‑based buffer overflow (CWE-120), could allow remote code execution if the attacker can reach the router’s web interface.

Affected Systems

The only vendor and product explicitly listed in the CVE data is the D-Link DI-8003 series router running firmware 16.07.26A1. No additional D-Link models or firmware revisions are identified as affected, and the issue is tied specifically to the /saveparm_usb.asp page of the router’s web administration interface.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity vulnerability that could compromise confidentiality, integrity, and availability of the device. The EPSS score of less than 1% suggests that exploitation is currently unlikely, and the vulnerability is not listed in the CISA KEV catalog, meaning no widespread exploitation has been reported. The likely attack vector is an HTTP request to /saveparm_usb.asp; this inference is based on the description of the vulnerable endpoint and the common practice of exposing router management interfaces on local or exposed networks.

Generated by OpenCVE AI on April 13, 2026 at 16:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the D-Link security bulletin linked in the references for a firmware update that addresses the buffer overflow issue.
  • If an updated firmware version is available, perform a controlled upgrade of the DI‑8003 router to the new firmware version.
  • Limit or disable external access to the router’s web administration interface, restricting management traffic to a secure internal network segment or VPN connections.
  • Monitor web server logs for repeated or malformed requests to /saveparm_usb.asp and apply rate limiting or blocking rules if suspicious activity persists after patching.

Generated by OpenCVE AI on April 13, 2026 at 16:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 16:00:00 +0000


Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title D-Link DI-8003 Buffer Overflow in USB Settings Endpoint

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Unauthorized Configuration via /saveparm_usb ASP id Handling on D‑Link DI‑8003
Weaknesses CWE-639

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink di-8003 Firmware
CPEs cpe:2.3:h:dlink:di-8003:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8003_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink di-8003 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Unauthorized Configuration via /saveparm_usb ASP id Handling on D‑Link DI‑8003
Weaknesses CWE-639

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8003
Vendors & Products Dlink
Dlink di-8003

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description An issue in D-Link DI-8003 16.07.26A1 related to improper handling of the id parameter in the /saveparm_usb.asp endpoint.
References

Subscriptions

Dlink Di-8003 Di-8003 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-22T15:32:24.227Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50652

cve-icon Vulnrichment

Updated: 2026-04-10T15:37:19.808Z

cve-icon NVD

Status : Modified

Published: 2026-04-08T19:24:15.917

Modified: 2026-04-22T16:16:49.957

Link: CVE-2025-50652

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:40:34Z

Weaknesses