Impact
A buffer overflow flaw exists in the D-Link DI-8003 router within the /user_group.asp endpoint. Because the system does not properly bound the name, mem, pri, and attr parameters, a crafted HTTP GET request can corrupt memory and potentially allow execution of arbitrary code. The vulnerability is a classic stack‑based overflow, classified under the weakness of improper restriction of operations within the bounds of a buffer. Attackers who exploit this flaw can gain covert control over the device, compromising confidentiality, integrity, and availability of the network it serves.
Affected Systems
The affected product is D‑Link DI‑8003 running firmware version 16.07.26A1. No other versions or vendors were listed, so remediation applies only to this specific firmware build.
Risk and Exploitability
The vulnerability is exposed via the web interface and can be triggered from any network that can reach the router’s HTTP service. No CVSS score is supplied, but a typical buffer‑overflow of this nature is regarded as high severity. EPSS is not available, and the vulnerability is not listed in CISA’s KEV catalog, yet the discovery of remote code execution likely leads to industry‑wide scrutiny. Without an official patch, the exploit remains theoretically possible if the router is still running the vulnerable firmware.
OpenCVE Enrichment