Impact
A buffer overflow vulnerability in the web_keyword.asp endpoint of D-Link DI-8003 routers running firmware 16.07.26A1 allows an attacker to overflow an internal buffer by sending a specially crafted HTTP GET request. The overflow can overwrite memory and potentially allow execution of arbitrary code, compromising the device’s confidentiality, integrity, and availability.
Affected Systems
The flaw affects the D‑Link DI‑8003 series router, specifically firmware version 16.07.26A1. No other versions or additional parameters were identified as vulnerable in the public disclosure.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity. The low EPSS score (<1%) suggests it is unlikely to be widely exploited in the near term, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is network based and requires an unauthenticated HTTP GET request to /web_keyword.asp, making it reachable from any host that can access the router’s management interface.
OpenCVE Enrichment