Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name and mem parameters in the /time_group.asp endpoint.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow flaw exists in the web interface of the D-Link DI-8003 router, affecting firmware version 16.07.26A1. The vulnerability arises when the /time_group.asp endpoint processes the name and mem parameters without proper bounds checking, leading to an out‑of‑bounds write (CWE‑120). An attacker who can reach this endpoint can send crafted input that overflows the buffer and potentially execute arbitrary code on the device, compromising confidentiality, integrity and availability.

Affected Systems

The issue specifically targets D-Link DI-8003 units running firmware 16.07.26A1. The CPE data confirms that the vulnerable component is the web management interface exposed on the device’s internal network. No other device models or firmware versions are listed as affected.

Risk and Exploitability

The vulnerability carries a CVSS v3 score of 7.5, indicating high severity. Its EPSS is below 1 % and it is not present in CISA’s KEV catalog, suggesting that large‑scale exploitation has not yet been observed. Exploitation would require network access to the router’s internal management interface, likely through a local or remote connection to the device. While discovery of the flaw is straightforward, the low exploit probability combined with the potential for complete device compromise warrants urgent attention.

Generated by OpenCVE AI on April 13, 2026 at 16:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the DI‑8003 firmware to a version that fixes the buffer overflow (consult D‑Link’s official security bulletin for the latest release).
  • If a patch is unavailable, restrict access to the /time_group.asp endpoint by firewall rules, VPN restrictions or by placing the device in a demilitarized zone.
  • Regularly monitor the router for any anomalous traffic targeting the /time_group.asp endpoint to detect potential exploitation attempts.

Generated by OpenCVE AI on April 13, 2026 at 16:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 16:00:00 +0000


Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D-Link DI-8003 Web Interface

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 Time Group Endpoint
Weaknesses CWE-119

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink di-8003 Firmware
CPEs cpe:2.3:h:dlink:di-8003:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8003_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink di-8003 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 Time Group Endpoint
Weaknesses CWE-119

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8003
Vendors & Products Dlink
Dlink di-8003

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name and mem parameters in the /time_group.asp endpoint.
References

Subscriptions

Dlink Di-8003 Di-8003 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-22T15:33:10.981Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50653

cve-icon Vulnrichment

Updated: 2026-04-10T15:37:18.876Z

cve-icon NVD

Status : Modified

Published: 2026-04-08T19:24:16.040

Modified: 2026-04-22T16:16:50.110

Link: CVE-2025-50653

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:40:33Z

Weaknesses