Impact
A buffer overflow arises from the way the custom_error parameter is processed in the /user.asp endpoint of the device, allowing an attacker to corrupt memory on the router. The overflow can lead to arbitrary code execution or a crash of the web services. The description does not detail the full scope, but the severity is implied by the nature of a buffer overflow. The likely attack vector is through the publicly reachable web interface, which is inferred from the presence of the /user.asp endpoint.
Affected Systems
The vulnerability affects D‑Link DI‑8003 devices with firmware 16.07.26A1. No other affected product or version information is available. The impact applies to any device running that specific firmware build.
Risk and Exploitability
The CVSS score is not supplied, and the EPSS value is missing, so the precise severity is uncertain; however, a buffer overflow is typically considered high risk. No KEV listing suggests it has not been widely exploited yet, but the potential for remote exploitation remains. Likely exploitation would require network access to the device's management web interface, and would grant the attacker control over the device or cause a denial of service.
OpenCVE Enrichment