Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name and mem parameters in the /time_group.asp endpoint.
Published: 2026-04-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Potential Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a buffer overflow that occurs when the /time_group.asp endpoint processes incorrect name and mem parameters on a D‑Link DI‑8003 router. The overflow could allow an attacker to write arbitrary data beyond the intended buffer, which in the best‑case scenario might lead to remote code execution or, at the minimum, a crash of the web interface. The precise outcomes are not detailed in the advisory, so the impact is inferred from the nature of the buffer overflow.

Affected Systems

The only product explicitly mentioned is the D‑Link DI‑8003 router running firmware version 16.07.26A1. No other firmware releases or device variants are listed in the advisory, so the scope appears limited to this combination.

Risk and Exploitability

No CVSS score, EPSS, or KEV listing is available, but a buffer overflow in a web‑exposed endpoint generally represents a high‑risk flaw. Exploitation would require network access to the device’s management interface; an attacker could send a crafted HTTP request to trigger the overflow. The lack of an official mitigation notice suggests that updating the firmware is the recommended defense. The severity and likelihood are therefore derived from the vulnerability type rather than specific metrics.

Generated by OpenCVE AI on April 8, 2026 at 20:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version released by D‑Link for the DI‑8003. If a firmware update is not yet available, restrict external network access to the device’s management interface or block the /time_group.asp endpoint.

Generated by OpenCVE AI on April 8, 2026 at 20:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 Time Group Endpoint
Weaknesses CWE-119

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8003
Vendors & Products Dlink
Dlink di-8003

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name and mem parameters in the /time_group.asp endpoint.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-08T17:28:49.627Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50653

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T19:24:16.040

Modified: 2026-04-08T21:26:13.410

Link: CVE-2025-50653

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:28:29Z

Weaknesses