CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Tags
Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper validation of user input in the qj.asp endpoint.
Analysis
Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 qj.asp endpoint enables unauthenticated remote denial-of-service attacks through malformed HTTP requests. Insufficient input validation allows attackers to trigger memory corruption, crashing the device and disrupting network services. Confidentiality and integrity remain intact per CVSS scoring, but availability impact is severe. No public exploit identified at time of analysis. EPSS indicates low observed exploitation activity.
Technical Context
CWE-120 classic buffer overflow in qj.asp HTTP handler. Firmware 16.07.26A1 fails to bounds-check user-supplied input before copying to fixed-size memory buffer, enabling stack/heap corruption. Network-accessible without authentication (CVSS AV:N/PR:N), low attack complexity (AC:L). Root cause: missing input length validation in web management interface.
Affected Products
D-Link DI-8003 router, firmware version 16.07.26A1. Vendor D-Link Corporation. CPE data insufficient for comprehensive version range identification. Enterprise-grade routing hardware with web-based administration vulnerable at unauthenticated endpoint.
Remediation
No vendor-released patch identified at time of analysis. Monitor D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ for firmware updates addressing CVE-2025-50644. Immediate mitigations: restrict management interface access to trusted internal networks only via firewall rules, disable remote administration features, implement network-level access controls to qj.asp endpoint. Consider replacing affected devices if D-Link discontinues support for DI-8003 hardware. Verify device is not internet-exposed using network scanning. Consult NVD advisory at https://nvd.nist.gov/vuln/detail/CVE-2025-50644 for updated remediation guidance.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209321
GHSA-9rgc-3p4m-823f