Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /xwgl_bwr.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request in the name, qq, and time parameters.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Assess Impact
AI Analysis

Impact

A buffer overflow flaw exists in the D‑Link DI‑8003 router’s web interface, specifically in the /xwgl_bwr.asp endpoint. The vulnerability is caused by improper handling of the name, qq, and time query parameters in an HTTP GET request. An attacker who can craft these parameters with oversized values can overflow the buffer, potentially corrupting memory and enabling arbitrary code execution, which would give the attacker control of the device.

Affected Systems

The flaw affects D‑Link DI‑8003 routers running firmware version 16.07.26A1. No other firmware revisions or models are listed as impacted.

Risk and Exploitability

The attack vector is through the publicly reachable web administration interface, so an external attacker can reach the vulnerable endpoint over the network. No CVSS or EPSS metrics are provided, and the vulnerability is not listed in CISA’s KEV catalog. The lack of published scores does not diminish the risk, given that the buffer overflow could lead to remote code execution. Defenders should consider this flaw serious until an official fix is released.

Generated by OpenCVE AI on April 8, 2026 at 20:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the D‑Link support website for a firmware update that addresses the /xwgl_bwr.asp buffer overflow on DI‑8003 16.07.26A1.
  • Install any available firmware patch immediately once released.
  • If no update is available, restrict external access to the router’s web administration interface with firewall rules or by disabling remote management.
  • Limit traffic to the /xwgl_bwr.asp endpoint from trusted IP ranges only.
  • Disable the /xwgl_bwr.asp page if it is not required for network operation.
  • Monitor the router’s logs for anomalous HTTP GET requests to the /xwgl_bwr.asp endpoint.
  • Perform routine vulnerability scans of the router to detect exploitation attempts.

Generated by OpenCVE AI on April 8, 2026 at 20:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8003
Dlink di-8003 Firmware
CPEs cpe:2.3:h:dlink:di-8003:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8003_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink di-8003
Dlink di-8003 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003 via /xwgl_bwr.asp Parameters
First Time appeared D-link
D-link di-8003
Weaknesses CWE-120
Vendors & Products D-link
D-link di-8003

Wed, 08 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /xwgl_bwr.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request in the name, qq, and time parameters.
References

Subscriptions

D-link Di-8003
Dlink Di-8003 Di-8003 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-10T15:40:34.059Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50670

cve-icon Vulnrichment

Updated: 2026-04-10T15:37:10.994Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T19:24:17.690

Modified: 2026-04-10T21:14:20.620

Link: CVE-2025-50670

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:28:32Z

Weaknesses