Impact
A buffer overflow occurs in the D‑Link DI‑8003 router when the web interface processes the pid parameter on the /trace.asp page. The flaw can lead to arbitrary code execution or denial of service on the device, as the overflow potentially allows an attacker to overwrite critical control data. The vulnerability is classified as CWE‑121, indicating a stack-based buffer overflow weakness.
Affected Systems
The affected system is the D‑Link DI‑8003 router running firmware version 16.07.26A1. No other firmware versions or hardware revisions are listed as impacted; the issue is tied specifically to the 16.07.26A1 build.
Risk and Exploitability
The CVSS score of 7.5 denotes a high severity, and the low EPSS score of less than 1% suggests that attacks have not yet been widely observed. The vulnerability does not appear in the CISA KEV catalog. Exploitation would likely occur over the local network or external web interface, requiring an adversary to send a specially crafted pid value to the /trace.asp endpoint. If successful, the attacker could compromise the router and potentially pivot to other devices on the same network.
OpenCVE Enrichment