Impact
A buffer overflow flaw exists in the D-Link DI-8003 firmware 16.07.26A1. The flaw arises from improper handling of the "name" parameter in the /url_group.asp web interface, allowing an attacker who can send a specially crafted HTTP request to overwrite memory. The overflow could be exploited to execute arbitrary code on the device, providing full compromise of the router. This weakness is classified as CWE-121: Stack-based Buffer Overflow.
Affected Systems
The vulnerability affects D-Link's DI-8003 router model, specifically those running firmware version 16.07.26A1. Earlier or later firmware releases are not known to be impacted based on the information supplied.
Risk and Exploitability
The CVSS score for this issue is 7.5, indicating high severity. The EPSS score is reported as less than 1 %, suggesting low current exploit activity, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, through the web administration interface, as the flaw is triggered by manipulating the name parameter on the /url_group.asp page. While an attacker would need network access to the router’s management interface, the potential impact of full device compromise makes it a significant risk for exposed or poorly isolated networks.
OpenCVE Enrichment