CVE-2025-50666

| EUVD-2025-209354 HIGH
2026-04-08 mitre GHSA-28h4-g6r3-j269
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209354
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of multiple parameters in the /web_post.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request in parameters such as name, en, user_id, log, and time.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote attackers to trigger denial-of-service conditions via crafted HTTP GET requests to /web_post.asp endpoint. Vulnerable parameters include name, en, user_id, log, and time fields. Attack requires no user interaction and exploits improper input validation in web management interface. CVSS 7.5 (High) severity with network-accessible attack vector. No public exploit identified at time of analysis. Low observed exploitation activity (EPSS <1%).

Technical Context

CWE-120 classic buffer overflow stems from inadequate boundary checks on user-supplied input to /web_post.asp GET parameters. Firmware version 16.07.26A1 fails to validate length constraints on name, en, user_id, log, time fields before copying to fixed-size memory buffers. Unauthenticated attack surface (PR:N) enables stack/heap corruption resulting in availability impact only per CVSS vector.

Affected Products

D-Link DI-8003 industrial router, firmware version 16.07.26A1. Vendor D-Link Corporation. No CPE product identifier provided beyond generic placeholder. Specific model DI-8003 confirmed affected.

Remediation

No vendor-released patch identified at time of analysis. D-Link security bulletin portal at https://www.dlink.com/en/security-bulletin/ does not list specific remediation for CVE-2025-50666 or firmware 16.07.26A1. Recommended immediate actions: disable remote web management interface access if not operationally required; restrict /web_post.asp endpoint access via firewall ACLs to trusted administrative networks only; implement input length validation at network perimeter using WAF/IPS signatures targeting oversized GET parameters. Monitor D-Link security advisories for firmware updates addressing buffer overflow in web interface. Consider device replacement if vendor discontinues DI-8003 support lifecycle.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2025-50666 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy