Impact
A stack-based buffer overflow exists in the /user_group.asp page of the D-Link DI-8003 router firmware 16.07.26A1. The vulnerability is caused by improper handling of the name, mem, pri, and attr parameters in an HTTP GET request. It is inferred that a successful overflow could allow an attacker to execute arbitrary code on the device, thereby compromising the router's integrity and confidentiality.
Affected Systems
The flaw affects only the D-Link DI-8003 model running firmware version 16.07.26A1. No other D-Link models or firmware releases are mentioned in the available reports. The affected component is the web-based administrative interface exposed at /user_group.asp.
Risk and Exploitability
The reported CVSS score of 7.5 indicates a high severity. The EPSS score is below 1%, and the vulnerability is not listed in the CISA KEV catalog, suggesting that public exploitation is currently unlikely. Based on the description, the likely attack vector is remote over HTTP, meaning an unauthenticated attacker with network access to the router’s web interface can craft the malicious request. The precise impact of exploitation is not explicitly stated, but a buffer overflow of this nature typically allows code execution with the privileges of the web-server process.
OpenCVE Enrichment