EUVD-2025-209321

| CVE-2025-50644 HIGH
2026-04-08 mitre GHSA-9rgc-3p4m-823f
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209321
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper validation of user input in the qj.asp endpoint.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 qj.asp endpoint enables unauthenticated remote denial-of-service attacks through malformed HTTP requests. Insufficient input validation allows attackers to trigger memory corruption, crashing the device and disrupting network services. Confidentiality and integrity remain intact per CVSS scoring, but availability impact is severe. No public exploit identified at time of analysis. EPSS indicates low observed exploitation activity.

Technical Context

CWE-120 classic buffer overflow in qj.asp HTTP handler. Firmware 16.07.26A1 fails to bounds-check user-supplied input before copying to fixed-size memory buffer, enabling stack/heap corruption. Network-accessible without authentication (CVSS AV:N/PR:N), low attack complexity (AC:L). Root cause: missing input length validation in web management interface.

Affected Products

D-Link DI-8003 router, firmware version 16.07.26A1. Vendor D-Link Corporation. CPE data insufficient for comprehensive version range identification. Enterprise-grade routing hardware with web-based administration vulnerable at unauthenticated endpoint.

Remediation

No vendor-released patch identified at time of analysis. Monitor D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ for firmware updates addressing CVE-2025-50644. Immediate mitigations: restrict management interface access to trusted internal networks only via firewall rules, disable remote administration features, implement network-level access controls to qj.asp endpoint. Consider replacing affected devices if D-Link discontinues support for DI-8003 hardware. Verify device is not internet-exposed using network scanning. Consult NVD advisory at https://nvd.nist.gov/vuln/detail/CVE-2025-50644 for updated remediation guidance.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2025-209321 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy