CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Tags
Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1, specifically in the handling of the wans parameter in the qos.asp endpoint.
Analysis
Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote attackers to trigger denial-of-service conditions through malformed wans parameter input to the qos.asp Quality-of-Service configuration endpoint. Exploitation requires no user interaction and achieves complete availability impact against network infrastructure device. Low observed exploitation activity (EPSS 0.02%, 5th percentile); no public exploit identified at time of analysis.
Technical Context
Classic stack-based buffer overflow (CWE-120) in web management interface parameter parsing. The qos.asp endpoint fails to validate wans parameter length before copying into fixed-size buffer, enabling memory corruption. Network-accessible attack vector with low complexity indicates vulnerability in HTTP request processing logic without boundary checks on user-controlled Quality-of-Service configuration input.
Affected Products
D-Link DI-8003 multi-WAN VPN router, firmware version 16.07.26A1. Vendor D-Link Corporation. No structured CPE enumeration available in source intelligence.
Remediation
No vendor-released patch identified at time of analysis. D-Link has not published firmware updates addressing CVE-2025-50647 for the DI-8003 model. Organizations operating affected devices should implement compensating controls: restrict web management interface access to trusted administrative networks only using firewall rules, disable remote management features if not operationally required, deploy intrusion prevention systems with signatures detecting abnormal HTTP parameter lengths targeting qos.asp, and monitor D-Link security bulletin portal for forthcoming patches. Consider hardware replacement if vendor discontinues support for this model. Consult official D-Link advisory: https://www.dlink.com/en/security-bulletin/
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209327
GHSA-52cq-r388-m853