Impact
A buffer overflow exists in the D‑Link DI‑8003 router firmware version 16.07.26A1 caused by improper handling of parameters in the /yyxz_dlink.asp endpoint. The flaw allows a remote attacker to supply oversized input, potentially overrunning memory and enabling arbitrary code execution or causing the device to crash. The weakness is classified as CWE‑120.
Affected Systems
The affected product is the D‑Link DI‑8003 router running firmware version 16.07.26A1. No other versions are mentioned in the data, so only this version is confirmed as vulnerable.
Risk and Exploitability
The vulnerability has a CVSS score of 7.5, indicating high severity. EPSS is below 1 %, suggesting low likelihood of exploitation at present, and it is not listed in the CISA KEV catalog. The likely attack vector is over the network, where an attacker sends a specially crafted HTTP request to the exposed /yyxz_dlink.asp page, triggering the overflow. If exploited, the attacker could gain code execution privileges on the router.
OpenCVE Enrichment