CVE-2025-50648

| EUVD-2025-209329 HIGH
2026-04-08 mitre GHSA-2rj7-q26c-9qc3
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209329
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to inadequate input validation in the /tggl.asp endpoint.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote attackers to trigger denial-of-service conditions via malformed input to the /tggl.asp endpoint. The vulnerability stems from inadequate input validation, allowing network-accessible exploitation without authentication or user interaction. Exploitation results in high-impact availability loss with no confidentiality or integrity compromise. No public exploit identified at time of analysis. EPSS score indicates low observed exploitation activity.

Technical Context

CWE-120 buffer overflow in /tggl.asp endpoint handler lacks boundary checking on user-controlled input. CVSS vector AV:N/AC:L/PR:N indicates network-accessible attack surface with trivial complexity. Impact limited to availability (A:H) suggests crash/resource exhaustion rather than memory corruption enabling code execution. Classic stack/heap overflow in embedded web server component.

Affected Products

D-Link DI-8003 router, firmware version 16.07.26A1. Vendor: D-Link. Specific CPE unavailable in authoritative sources; affected product limited to identified firmware build.

Remediation

No vendor-released patch identified at time of analysis. Monitor D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ for firmware updates addressing CVE-2025-50648. Implement network-level access controls restricting administrative interface exposure to trusted IP ranges. Consider disabling /tggl.asp endpoint functionality if operationally feasible through firewall rules or web server configuration. Deploy intrusion detection signatures targeting abnormal request patterns to the vulnerable endpoint. Organizations unable to apply immediate mitigations should evaluate device replacement with supported hardware receiving active security maintenance. Consult NVD advisory at https://nvd.nist.gov/vuln/detail/CVE-2025-50648 for ongoing disclosure updates and proof-of-concept tracking.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2025-50648 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy