Impact
The vulnerability is a buffer overflow that occurs when the /time_group.asp endpoint processes incorrect name and mem parameters on a D‑Link DI‑8003 router. The overflow could allow an attacker to write arbitrary data beyond the intended buffer, which in the best‑case scenario might lead to remote code execution or, at the minimum, a crash of the web interface. The precise outcomes are not detailed in the advisory, so the impact is inferred from the nature of the buffer overflow.
Affected Systems
The only product explicitly mentioned is the D‑Link DI‑8003 router running firmware version 16.07.26A1. No other firmware releases or device variants are listed in the advisory, so the scope appears limited to this combination.
Risk and Exploitability
No CVSS score, EPSS, or KEV listing is available, but a buffer overflow in a web‑exposed endpoint generally represents a high‑risk flaw. Exploitation would require network access to the device’s management interface; an attacker could send a crafted HTTP request to trigger the overflow. The lack of an official mitigation notice suggests that updating the firmware is the recommended defense. The severity and likelihood are therefore derived from the vulnerability type rather than specific metrics.
OpenCVE Enrichment