CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Tags
Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to inadequate input validation in the /tggl.asp endpoint.
Analysis
Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote attackers to trigger denial-of-service conditions via malformed input to the /tggl.asp endpoint. The vulnerability stems from inadequate input validation, allowing network-accessible exploitation without authentication or user interaction. Exploitation results in high-impact availability loss with no confidentiality or integrity compromise. No public exploit identified at time of analysis. EPSS score indicates low observed exploitation activity.
Technical Context
CWE-120 buffer overflow in /tggl.asp endpoint handler lacks boundary checking on user-controlled input. CVSS vector AV:N/AC:L/PR:N indicates network-accessible attack surface with trivial complexity. Impact limited to availability (A:H) suggests crash/resource exhaustion rather than memory corruption enabling code execution. Classic stack/heap overflow in embedded web server component.
Affected Products
D-Link DI-8003 router, firmware version 16.07.26A1. Vendor: D-Link. Specific CPE unavailable in authoritative sources; affected product limited to identified firmware build.
Remediation
No vendor-released patch identified at time of analysis. Monitor D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ for firmware updates addressing CVE-2025-50648. Implement network-level access controls restricting administrative interface exposure to trusted IP ranges. Consider disabling /tggl.asp endpoint functionality if operationally feasible through firewall rules or web server configuration. Deploy intrusion detection signatures targeting abnormal request patterns to the vulnerable endpoint. Organizations unable to apply immediate mitigations should evaluate device replacement with supported hardware receiving active security maintenance. Consult NVD advisory at https://nvd.nist.gov/vuln/detail/CVE-2025-50648 for ongoing disclosure updates and proof-of-concept tracking.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209329
GHSA-2rj7-q26c-9qc3