EUVD-2025-209331

| CVE-2025-50649 HIGH
2026-04-08 mitre GHSA-9pgj-j82m-2hvc
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209331
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper input validation in the vlan_name parameter in the /shut_set.asp endpoint.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote attackers to trigger denial-of-service conditions through malformed vlan_name parameter submitted to /shut_set.asp endpoint. Improper input validation in VLAN configuration interface permits memory corruption leading to system availability disruption. CVSS 7.5 reflects network-accessible attack requiring no user interaction or credentials. No public exploit identified at time of analysis; low observed exploitation activity (EPSS 0.02%).

Technical Context

CWE-120 stack-based buffer overflow in VLAN naming function within DI-8003 embedded web server. Lack of boundary checking on vlan_name string parameter enables memory overwrite during configuration processing. Attack vector AV:N/PR:N indicates remotely exploitable without authentication through HTTP interface.

Affected Products

D-Link DI-8003 industrial router, firmware version 16.07.26A1. Vendor: D-Link Corporation. Specific version range beyond confirmed vulnerable build unknown at time of analysis.

Remediation

No vendor-released patch identified at time of analysis per D-Link Security Bulletin archives (https://www.dlink.com/en/security-bulletin/). Monitor vendor advisory page for firmware updates addressing buffer overflow in VLAN configuration handler. Until patch availability confirmed, implement compensating controls: restrict administrative interface access to trusted management networks only via firewall rules, disable remote administration if not operationally required, apply principle of least privilege to network device access. For production environments requiring VLAN configuration, validate input length client-side and monitor device logs for crash patterns indicating exploitation attempts. Consider device replacement if vendor discontinues support for DI-8003 product line.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2025-209331 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy