CVE-2025-50669

| EUVD-2025-209359 HIGH
2026-04-08 mitre GHSA-9vm7-74c3-v5fg
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209359
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 and DI-8003G 19.12.10A1 due to improper handling of the wan_ping parameter in the /wan_ping.asp endpoint.

Analysis

Buffer overflow in D-Link DI-8003 (16.07.26A1) and DI-8003G (19.12.10A1) routers enables unauthenticated remote denial-of-service through improper handling of the wan_ping parameter at the /wan_ping.asp endpoint. Network-accessible attack requires no user interaction or privileges. CVSS:3.1 score 7.5 (High) reflects availability impact. No public exploit identified at time of analysis. Low observed exploitation activity (EPSS 0.02%).

Technical Context

CWE-120 buffer overflow occurs when /wan_ping.asp endpoint processes oversized wan_ping parameter without bounds checking. Unauthenticated network access (CVSS AV:N, PR:N) enables memory corruption leading to service disruption. Vulnerability affects web management interface parsing routines in legacy D-Link router firmware versions.

Affected Products

D-Link DI-8003 firmware version 16.07.26A1, D-Link DI-8003G firmware version 19.12.10A1. Both models are network routers with exposed web management interfaces.

Remediation

Consult D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ for patched firmware releases addressing CVE-2025-50669. No vendor-released patch version independently confirmed at time of analysis. If updated firmware unavailable, disable remote web management access and restrict administrative interface to trusted internal networks only via firewall rules. Implement IP allowlisting for management access. Monitor https://nvd.nist.gov/vuln/detail/CVE-2025-50669 for updated vendor guidance. Consider replacement with actively supported hardware if D-Link issues end-of-life notice for affected models.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2025-50669 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy