A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /xwgl_ref.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request with excessively long strings in parameters name, en, user_id, shibie_name, time, act, log, and rpri.
| Vendor | Product | Versions |
|---|---|---|
| n/a | n/a | n/a |
Updated vendor to D-Link, product to DI-8003, severity to CRITICAL, and added a detailed description of the vulnerability.
Initial creation