Impact
A stack-based buffer overflow exists in the /wan_line_detection.asp web endpoint of D-Link DI-8003 routers running firmware 16.07.26A1. The overflow is triggered by improper handling of the iface parameter, which can be manipulated to override local variables and potentially execute arbitrary code on the device. The vulnerability is identified as CWE‑120 and could allow a remote attacker to gain full control of the router, compromising confidentiality, integrity, and availability of the network traffic managed by the device.
Affected Systems
The affected system is the D-Link DI-8003 wireless router, specifically models running firmware version 16.07.26A1. No other vendors or product versions are listed as vulnerable.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity level for this flaw. The EPSS score of less than 1% suggests a low probability of exploitation in the wild, and the vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is via the publicly accessible web interface; a remote attacker could craft a malicious request to the /wan_line_detection.asp endpoint to trigger the stack overflow and potentially execute arbitrary code on the device, provided the router’s web management interface is exposed to the WAN side or accessible from the local network.
OpenCVE Enrichment