Impact
The vulnerability is a classic buffer overflow that affects the id parameter in the /thd_member.asp endpoint of D‑Link DI‑8003 routers. The firmware 16.07.26A1 does not validate the length of the id input, allowing an attacker to overwrite adjacent memory. This overflow can be used to inject and execute arbitrary code, potentially compromising device control and network traffic.
Affected Systems
Affected devices are D‑Link DI‑8003 routers running firmware version 16.07.26A1. The public CPE enumerations confirm the product and firmware version. No other versions or vendors are listed.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, and the low EPSS score (<1 %) suggests that exploitation is not widely reported. It is not listed in the CISA KEV catalog, so no well‑known public exploits have been documented yet. The flaw is reachable through the publicly exposed /thd_member.asp web endpoint, so remote hosts on the same network or Internet‑accessible devices could target it. While the path is relatively straightforward, attackers would need to craft an input that precisely overflows the buffer, a task that may require some ingenuity but is achievable with modern fuzzing.
OpenCVE Enrichment