Impact
This flaw is a stack‑based buffer overflow that occurs in the /xwgl_ref.asp endpoint of the D‑Link DI‑8003 router. When an attacker sends a specially crafted HTTP GET request containing excessively long values for the name, en, user_id, shibie_name, time, act, log, or rpri parameters, the server overwrites memory on the stack. The overflow can allow the attacker to inject and execute arbitrary code on the device, giving full control over the router and potentially its connected network.
Affected Systems
Devices affected are D‑Link DI‑8003 routers running firmware version 16.07.26A1. No other firmware releases or product variants are listed as vulnerable in the current advisory.
Risk and Exploitability
The advisory rates the flaw with a CVSS score of 7.5, indicating a high impact severity. The EPSS score is less than 1 %, suggesting that current exploitation efforts are very low, and the vulnerability is not yet catalogued in the CISA KEV list. Attackers could reach the vulnerable endpoint remotely over HTTP, so the attack vector is likely external. The likelihood of accidental exploitation is low, but the potential compromise is severe, so the overall risk remains high until the firmware is updated.
OpenCVE Enrichment