CVE-2025-50657

| EUVD-2025-209339 HIGH
2026-04-08 mitre GHSA-wxjc-8jrx-5v2m
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209339
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the pid parameter in the /trace.asp endpoint.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote attackers to trigger denial-of-service conditions through malformed pid parameter values in the /trace.asp endpoint. The vulnerability requires no user interaction and is exploitable over the network with low attack complexity, affecting network availability for enterprise routing infrastructure. No public exploit identified at time of analysis.

Technical Context

Stack-based buffer overflow (CWE-121) caused by insufficient input validation on the pid parameter in the trace.asp diagnostic endpoint. The firmware fails to enforce bounds checking during buffer copy operations, allowing oversized input to corrupt stack memory and crash the routing service.

Affected Products

D-Link DI-8003 Industrial Gigabit VPN router, firmware version 16.07.26A1. Vendor: D-Link Corporation. Specific CPE not available in authoritative sources at time of analysis.

Remediation

No vendor-released patch identified at time of analysis. Monitor D-Link security bulletin page (https://www.dlink.com/en/security-bulletin/) for firmware updates addressing CVE-2025-50657. Interim mitigation: restrict administrative interface access to trusted management networks only through firewall rules, disable remote management features if not operationally required, and implement network segmentation to isolate vulnerable devices. Consider replacing affected units if extended support timelines cannot be confirmed. For additional vulnerability context, consult researcher disclosure at https://github.com/xiaotea/iot-vulnerability-collection/blob/main/README.md and monitor NVD advisory updates at https://nvd.nist.gov/vuln/detail/CVE-2025-50657.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2025-50657 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy