Impact
The vulnerable component is the /thd_group.asp endpoint of the D-Link DI-8003 device. Improper handling of the name parameter allows an attacker to trigger a buffer overflow. When executed, this overflow can lead to arbitrary code execution, allowing an attacker to take full control of the device and compromise confidential data or disrupt network services. The weakness corresponds to CWE-121, stack-based buffer overflow.
Affected Systems
The flaw affects D-Link DI‑8003 routers running firmware version 16.07.26A1. No other firmware versions or models are indicated as vulnerable in the supplied data.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity vulnerability. The EPSS score of less than 1% suggests that exploit activity is currently rare. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, via the device’s web interface, because the name parameter is exposed through an HTTP endpoint. Exploitation would require network connectivity to the device, and may be possible even without privileged local access if the web interface is publicly reachable.
OpenCVE Enrichment