Impact
A buffer overflow occurs when the wan_ping parameter is processed in the /wan_ping.asp web endpoint. This flaw can allow an attacker to supply specially crafted input that overflows an internal buffer, potentially leading to arbitrary code execution or a crash that disrupts router operation. The weakness is a classic buffer overflow vulnerability.
Affected Systems
The defect affects D‑Link DI‑8003 running firmware 16.07.26A1 and D‑Link DI‑8003G running firmware 19.12.10A1. These models expose the vulnerable endpoint through the web interface used for managing WAN ping settings.
Risk and Exploitability
The CVSS score and EPSS rating are not available, and the vulnerability is not listed in the CISA KEV catalog. However, the likely attack vector is remote via the publicly accessible /wan_ping.asp page, meaning an external adversary could trigger the flaw with an HTTP request. Given the nature of the vulnerability, successful exploitation could compromise confidentiality, integrity, or availability of the device.
OpenCVE Enrichment