Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /xwgl_bwr.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request in the name, qq, and time parameters.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Potential device crash or denial of service via buffer overflow in web interface
Action: Patch
AI Analysis

Impact

A buffer overrun arises in D‑Link DI‑8003 firmware 16.07.26A1 when a web administrator sends overly long values in the name, qq, and time fields of the /xwgl_bwr.asp URL. The vulnerability originates from insufficient bounds checking, which can corrupt memory. The specified behavior is limited to memory corruption that may produce a device crash or loss of service; the description does not confirm arbitrary code execution, so any higher‑grade impact is inferred rather than stated.

Affected Systems

The flaw is specific to DI‑8003 routers running firmware version 16.07.26A1. The affected endpoint is part of the router’s web management interface, which could be accessed locally or from the Internet if the device is exposed.

Risk and Exploitability

The metric set assigns a CVSS score of 7.5, indicating high severity. The EPSS value is reported as less than 1 %, meaning exploitation is currently unlikely. The vulnerability is not listed in the CISA KEV catalog, implying no confirmed active exploitation. The attack vector is remote over HTTP GET to the vulnerable parameters and does not require prior authentication; a crafted request suffices. Successful exploitation would likely lead to a device crash or service disruption rather than confirmed code execution.

Generated by OpenCVE AI on April 10, 2026 at 23:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to a firmware version newer than 16.07.26A1 to eliminate the check deficit.
  • If an update is unavailable or delayed, block access to /xwgl_bwr.asp by configuring a firewall rule or disable the web management interface from external networks.
  • Verify that the firmware you deploy does not contain the same vulnerability by reviewing vendor release notes or security bulletins.
  • Monitor vulnerability feeds for any additional information or exploitation proofs that may necessitate further action.

Generated by OpenCVE AI on April 10, 2026 at 23:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 via /xwgl_bwr.asp Parameters

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8003
Dlink di-8003 Firmware
CPEs cpe:2.3:h:dlink:di-8003:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8003_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink di-8003
Dlink di-8003 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 via /xwgl_bwr.asp Parameters
First Time appeared D-link
D-link di-8003
Weaknesses CWE-120
Vendors & Products D-link
D-link di-8003

Wed, 08 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /xwgl_bwr.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request in the name, qq, and time parameters.
References

Subscriptions

D-link Di-8003
Dlink Di-8003 Di-8003 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-10T15:40:34.059Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50670

cve-icon Vulnrichment

Updated: 2026-04-10T15:37:10.994Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T19:24:17.690

Modified: 2026-04-10T21:14:20.620

Link: CVE-2025-50670

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:26:02Z

Weaknesses