CVE-2025-50661

| EUVD-2025-209345 HIGH
2026-04-08 mitre GHSA-g4cp-69rc-xxc2
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209345
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of multiple parameters in the /url_rule.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request with parameters name, en, ips, u, time, act, rpri, and log.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote attackers to trigger denial-of-service conditions via crafted HTTP GET requests to the /url_rule.asp endpoint. Exploitation requires no user interaction and succeeds over network access with low complexity. Eight vulnerable parameters (name, en, ips, u, time, act, rpri, log) accept unbounded input causing stack memory corruption. CVSS 7.5 HIGH severity reflects network-accessible availability impact. No public exploit identified at time of analysis. EPSS 0.01% indicates low observed exploitation activity.

Technical Context

CWE-121 stack-based buffer overflow stems from missing input validation on multiple GET parameters in /url_rule.asp CGI handler. Firmware version 16.07.26A1 fails to enforce length constraints before copying user-controlled data to fixed-size stack buffers, enabling memory corruption. CVSS vector AV:N/AC:L/PR:N confirms network-based unauthenticated attack surface.

Affected Products

D-Link DI-8003 router, firmware version 16.07.26A1. Vendor: D-Link. No CPE refinement available beyond generic placeholder. Vulnerability isolated to url_rule.asp web management interface component handling URL filtering rules.

Remediation

No vendor-released patch identified at time of analysis per D-Link security bulletin repository at https://www.dlink.com/en/security-bulletin/. Immediate mitigation: restrict administrative interface access to trusted management networks via firewall rules, disable WAN-side HTTP/HTTPS management, implement IP allowlisting for web console access. Organizations must monitor D-Link security bulletin for firmware updates addressing CVE-2025-50661. If extended vendor support unavailable, evaluate router replacement with actively maintained alternatives. Validate any future firmware releases against researcher disclosure at https://github.com/xiaotea/iot-vulnerability-collection/blob/main/README.md before deployment. Implement network segmentation isolating affected devices from untrusted zones.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2025-50661 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy