Impact
A buffer overflow exists in the /url_rule.asp endpoint of the D‑Link DI‑8003 firmware 16.07.26A1. The flaw arises from improper handling of multiple query parameters (name, en, ips, u, time, act, rpri, log) in an HTTP GET request. By sending a crafted request, the overflow could write beyond the intended buffer area, potentially allowing an attacker to manipulate data processing or control the device’s execution flow.
Affected Systems
The affected product is the D‑Link DI‑8003 router running firmware version 16.07.26A1. Only this specific firmware revision is known to be vulnerable.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, while the EPSS score of less than 1% suggests that the vulnerability is not currently being widely exploited. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an adversary to be able to send an HTTP GET request to the device’s /url_rule.asp endpoint, which generally means the attacker must have network reachability to the router.
OpenCVE Enrichment