Impact
A buffer overflow occurs when the router processes the pid parameter in the /trace.asp web request. The improper validation can allow an attacker to overwrite memory on the device and potentially execute arbitrary code, compromising confidentiality, integrity, and availability of the network.
Affected Systems
D‑Link DI‑8003 router running firmware 16.07.26A1 is identified as affected. No other versions or manufacturers are listed in the report.
Risk and Exploitability
The vulnerability has no publicly disclosed exploit data and is not listed in the CISA KEV catalog. EPSS data is unavailable, so the relative likelihood is unknown. The attack is inferred to be possible via the publicly accessible HTTP endpoint; an attacker would need to send a crafted packet to the pid parameter, which may be reachable from the LAN or the internet if the router is exposed. Because buffer overflows often lead to remote code execution, the potential impact is severe.
OpenCVE Enrichment