CVE-2025-50659

| EUVD-2025-209341 HIGH
2026-04-08 mitre GHSA-rp5p-fr9g-xq7m
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209341
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the custom_error parameter in the /user.asp endpoint.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote denial-of-service via malformed custom_error parameter to /user.asp endpoint. Attackers can crash device remotely without credentials by exploiting stack-based buffer overflow (CWE-121). CVSS 7.5 reflects network-accessible, low-complexity attack requiring no user interaction. No public exploit identified at time of analysis; low observed exploitation activity (EPSS 0.02%).

Technical Context

Stack-based buffer overflow (CWE-121) triggered by unbounded input to custom_error parameter in /user.asp handler. Firmware version 16.07.26A1 lacks input validation, allowing oversized data to overwrite stack memory. Network vector (AV:N) with no authentication requirement (PR:N) enables remote exploitation targeting availability (A:H).

Affected Products

D-Link DI-8003 router, firmware version 16.07.26A1. Vendor: D-Link. Specific CPE unavailable in authoritative sources.

Remediation

No vendor-released patch identified at time of analysis. D-Link has not published firmware updates addressing CVE-2025-50659 for DI-8003 16.07.26A1 per official security bulletin at https://www.dlink.com/en/security-bulletin/. Organizations should immediately isolate affected DI-8003 devices from untrusted networks, restrict management interface access via firewall rules permitting only trusted IP ranges, and disable remote administration features. Monitor D-Link security advisories for forthcoming patches. Consider hardware replacement if device reaches end-of-life status without vendor support. Implement network segmentation to limit blast radius of potential DoS attacks.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2025-50659 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy