Impact
A buffer overflow vulnerability exists in the D‑Link DI‑8003 firmware version 16.07.26A1, caused by improper handling of multiple parameters in the /web_post.asp endpoint. An attacker can trigger the overflow by sending a crafted HTTP GET request containing malicious data in the name, en, user_id, log, and time parameters. The overflow could allow an unauthenticated attacker to execute arbitrary code on the device, compromising confidentiality, integrity, and availability. This weakness is a classic stack buffer overflow, identified as CWE‑120.
Affected Systems
Affected devices are D‑Link DI‑8003 routers running firmware version 16.07.26A1. No other affected versions are documented, but prior firmware releases that include the same /web_post.asp code may also be vulnerable.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, while the EPSS score of less than 1 % suggests a low likelihood of current exploitation. The vulnerability is not listed in the CISA KEV catalog. Likely, an attacker needs network access to the device’s web interface and can exploit the flaw via HTTP GET requests to /web_post.asp, potentially leading to remote code execution or denial‑of‑service. The remote nature of the attack poses a significant threat to exposed devices.
OpenCVE Enrichment