Impact
A buffer overflow exists in the DI-8003 model’s /web_post.asp endpoint due to improper handling of parameters such as name, en, user_id, log, and time sent via a crafted HTTP GET request. The flaw allows an attacker to overflow a memory buffer and potentially execute arbitrary code on the device, resulting in total loss of confidentiality, integrity, and availability.
Affected Systems
The affected system is a D‑Link DI‑8003 router running firmware version 16.07.26A1. No other products or versions are reported in the CVE data. The vulnerability is specific to that firmware release.
Risk and Exploitability
The CVSS score is not provided, but buffer overflow vulnerabilities are typically high severity and often result in remote code execution. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog, though a documented exploit is not known. The attack vector is inferred to be remote via an HTTP GET request to /web_post.asp, meaning that an attacker only needs network access to the device’s web interface to potentially exploit the flaw.
OpenCVE Enrichment