Impact
A buffer overflow flaw exists in the D‑Link DI‑8003 device running firmware 16.07.26A1, caused by improper handling of the name parameter in the /usb_paswd.asp web interface. The excess input can overwrite adjacent memory, potentially leading to corruption of device firmware or internal data structures. The description does not state a specific consequence, but a buffer overflow of this nature could be leveraged to alter execution flow, so the potential impact may include remote code execution or denial of service.
Affected Systems
All units of the D‑Link DI‑8003 running firmware revision 16.07.26A1 are affected. No other firmware versions are mentioned in the advisory.
Risk and Exploitability
No CVSS score or EPSS data is supplied, so the formal severity cannot be quantified. The flaw is reachable through the HTTP interface exposed by the device, meaning an attacker with network access to the web interface can attempt the exploit. The vulnerability is not listed in CISA’s KEV catalog, but that does not rule out potential exploitation, especially for devices exposed to the internet or an untrusted network segment.
OpenCVE Enrichment