Impact
The vulnerability is a stack-based buffer overflow located in the /web_list_opt.asp endpoint of the D‑Link DI‑8003 web interface. Improper handling of the s parameter allows an attacker to overflow a local buffer, leading to memory corruption. Based on the description, it is inferred that an attacker could exploit this overflow to execute arbitrary code on the device, although the CVE text does not confirm a successful exploit. This weakness falls under buffer overflow (CWE‑120) and could compromise the confidentiality, integrity, or availability of the device if exploited. The CVSS base score of 7.5 indicates a high severity scenario.
Affected Systems
Products affected by this vulnerability are the D‑Link DI‑8003 router running firmware version 16.07.26A1. The CVE does not mention later firmware revisions as affected, and no other versions are listed in the advisory.
Risk and Exploitability
The CVSS score of 7.5 reflects a high severity risk, while an EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not present in the CISA KEV catalog. The likely attack vector is remote via the device’s web interface, requiring network reachability to the router. Exploitation would involve sending a maliciously crafted s parameter to trigger the buffer overflow.
OpenCVE Enrichment