CVE-2025-50671

| EUVD-2025-209361 HIGH
2026-04-08 mitre GHSA-95hh-fj32-cpj5
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209361
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /xwgl_ref.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request with excessively long strings in parameters name, en, user_id, shibie_name, time, act, log, and rpri.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote denial of service through the /xwgl_ref.asp endpoint. Attackers exploit improper input validation by sending HTTP GET requests with excessively long strings in eight parameters (name, en, user_id, shibie_name, time, act, log, rpri), causing stack buffer overflow and device crash. Low observed exploitation activity (EPSS <1%). No public exploit identified at time of analysis. Affects network-accessible management interface without authentication requirements.

Technical Context

Stack-based buffer overflow (CWE-121) occurs in /xwgl_ref.asp web management handler due to missing bounds validation on eight HTTP GET parameters. Firmware fails to limit input length before copying data to fixed-size stack buffers, enabling memory corruption and denial of service via remotely crafted requests (CVSS AV:N/AC:L/PR:N).

Affected Products

D-Link DI-8003 router, firmware version 16.07.26A1. Vendor: D-Link. Specific CPE unavailable in current advisories.

Remediation

No vendor-released patch identified at time of analysis. D-Link security bulletin (https://www.dlink.com/en/security-bulletin/) does not list remediation for CVE-2025-50671 as of current review. Recommended immediate actions: disable remote management access to /xwgl_ref.asp endpoint via firewall rules; restrict administrative interface access to trusted internal networks only; monitor D-Link security bulletin for firmware updates addressing this vulnerability. Consider hardware replacement if D-Link confirms end-of-life status for DI-8003 model without security patches. Implement network segmentation to isolate affected devices from untrusted networks until permanent fix becomes available.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2025-50671 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy