CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Tags
Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the iface parameter in the /wan_line_detection.asp endpoint.
Analysis
Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote denial of service via malicious iface parameter to /wan_line_detection.asp endpoint. Attack requires no user interaction and exploits improper input validation in network-accessible web management interface. CVSS 7.5 (High) severity reflects availability impact; no public exploit identified at time of analysis. Low observed exploitation activity (EPSS 0.02%).
Technical Context
Classic stack-based buffer overflow (CWE-120) in web server handling of iface parameter during WAN line detection processing. Improper bounds checking allows oversized input to corrupt memory, triggering service crash. CVSS vector AV:N/AC:L/PR:N confirms network-accessible, low-complexity attack requiring no privileges.
Affected Products
D-Link DI-8003 industrial router, firmware version 16.07.26A1. Vendor: D-Link Corporation. Specific CPE unavailable; applies to identified firmware build only.
Remediation
No vendor-released patch identified at time of analysis. Consult D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ for firmware updates. Immediate mitigations: restrict web management interface access to trusted networks via firewall rules, disable remote administration if not operationally required, implement IP allowlisting for administrative access. Monitor D-Link advisory page and NVD entry https://nvd.nist.gov/vuln/detail/CVE-2025-50667 for patch availability. Consider hardware replacement if device reaches end-of-life without security updates, as buffer overflows in network-facing services pose persistent availability risk.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209357