Impact
A buffer overflow vulnerability was identified in D‑Link DI‑8003 firmware 16.07.26A1 due to unsanitized handling of the name parameter in the /thd_group.asp endpoint. The flaw allows an attacker to overflow a memory buffer, which could lead to arbitrary code execution or other disruptive behaviors. While the CVE description does not explicitly state remote code execution, buffer overflow defects of this nature typically enable such exploits.
Affected Systems
The vulnerability affects D‑Link DI‑8003 devices running firmware version 16.07.26A1. No other products or firmware versions are listed as impacted in the advisory. Devices that expose the /thd_group.asp resource to external networks are at risk.
Risk and Exploitability
The CVSS score is not publicly documented, but buffer overflow flaws are generally considered high severity. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote; an attacker must be able to send crafted HTTP requests to /thd_group.asp from outside the local network. Exfiltration or persistence would depend on successful exploitation of the overflow.
OpenCVE Enrichment