Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of input parameters in the /web_keyword.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request via the name, en, time, mem_gb2312, and mem_utf8 parameters.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate patch
AI Analysis

Impact

A buffer overflow vulnerability in the web_keyword.asp endpoint of D-Link DI-8003 routers running firmware 16.07.26A1 allows an attacker to overflow an internal buffer by sending a specially crafted HTTP GET request. The overflow can overwrite memory and potentially allow execution of arbitrary code, compromising the device’s confidentiality, integrity, and availability.

Affected Systems

The flaw affects the D‑Link DI‑8003 series router, specifically firmware version 16.07.26A1. No other versions or additional parameters were identified as vulnerable in the public disclosure.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity. The low EPSS score (<1%) suggests it is unlikely to be widely exploited in the near term, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is network based and requires an unauthenticated HTTP GET request to /web_keyword.asp, making it reachable from any host that can access the router’s management interface.

Generated by OpenCVE AI on April 13, 2026 at 15:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest D‑Link firmware update that addresses the buffer overflow in web_keyword.asp.
  • If an immediate update is unavailable, disable the /web_keyword.asp functionality or block access to the endpoint using firewall rules.
  • Restrict management interface access to trusted networks or use VPNs.
  • Verify that the router’s firmware is at a version newer than 16.07.26A1.
  • Monitor device logs for suspicious HTTP requests targeting the affected endpoint.

Generated by OpenCVE AI on April 13, 2026 at 15:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 16:00:00 +0000


Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D-Link DI-8003 Web Keyword Endpoint

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D-Link DI-8003 /web_keyword.asp Allows Remote Exploit
Weaknesses CWE-119
CWE-787

Fri, 10 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8003
Dlink di-8003 Firmware
CPEs cpe:2.3:h:dlink:di-8003:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8003_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink di-8003
Dlink di-8003 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link di-8003
Vendors & Products D-link
D-link di-8003

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D-Link DI-8003 /web_keyword.asp Allows Remote Exploit
Weaknesses CWE-119
CWE-787

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of input parameters in the /web_keyword.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request via the name, en, time, mem_gb2312, and mem_utf8 parameters.
References

Subscriptions

D-link Di-8003
Dlink Di-8003 Di-8003 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-22T15:43:08.844Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50665

cve-icon Vulnrichment

Updated: 2026-04-10T15:37:17.025Z

cve-icon NVD

Status : Modified

Published: 2026-04-08T19:24:17.140

Modified: 2026-04-22T16:16:51.653

Link: CVE-2025-50665

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:40:23Z

Weaknesses