CVE-2025-50647

| EUVD-2025-209327 HIGH
2026-04-08 mitre GHSA-52cq-r388-m853
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209327
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1, specifically in the handling of the wans parameter in the qos.asp endpoint.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote attackers to trigger denial-of-service conditions through malformed wans parameter input to the qos.asp Quality-of-Service configuration endpoint. Exploitation requires no user interaction and achieves complete availability impact against network infrastructure device. Low observed exploitation activity (EPSS 0.02%, 5th percentile); no public exploit identified at time of analysis.

Technical Context

Classic stack-based buffer overflow (CWE-120) in web management interface parameter parsing. The qos.asp endpoint fails to validate wans parameter length before copying into fixed-size buffer, enabling memory corruption. Network-accessible attack vector with low complexity indicates vulnerability in HTTP request processing logic without boundary checks on user-controlled Quality-of-Service configuration input.

Affected Products

D-Link DI-8003 multi-WAN VPN router, firmware version 16.07.26A1. Vendor D-Link Corporation. No structured CPE enumeration available in source intelligence.

Remediation

No vendor-released patch identified at time of analysis. D-Link has not published firmware updates addressing CVE-2025-50647 for the DI-8003 model. Organizations operating affected devices should implement compensating controls: restrict web management interface access to trusted administrative networks only using firewall rules, disable remote management features if not operationally required, deploy intrusion prevention systems with signatures detecting abnormal HTTP parameter lengths targeting qos.asp, and monitor D-Link security bulletin portal for forthcoming patches. Consider hardware replacement if vendor discontinues support for this model. Consult official D-Link advisory: https://www.dlink.com/en/security-bulletin/

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2025-50647 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy