EUVD-2025-209334

| CVE-2025-50653 HIGH
2026-04-08 mitre GHSA-826p-7fm9-74fr
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209334
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name and mem parameters in the /time_group.asp endpoint.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote attackers to trigger denial-of-service conditions via malformed name and mem parameters submitted to the /time_group.asp endpoint. The vulnerability requires no user interaction and permits network-based exploitation with low attack complexity. No public exploit identified at time of analysis. EPSS score of 0.02% indicates low observed exploitation activity.

Technical Context

CWE-120 buffer overflow stems from insufficient input validation on name and mem parameters in the time_group.asp HTTP endpoint. Improper boundary checking allows oversized inputs to overflow fixed-size buffers, destabilizing device availability. The CVSS vector AV:N/PR:N confirms network-accessible attack surface requiring no authentication, typical of embedded web management interface vulnerabilities in networking appliances.

Affected Products

D-Link DI-8003 router firmware version 16.07.26A1. Vendor and specific CPE data incomplete in available sources. Affected component: web management interface (/time_group.asp endpoint).

Remediation

No vendor-released patch identified at time of analysis. Monitor D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ for firmware updates addressing CVE-2025-50653. Immediate mitigations: restrict management interface access to trusted IP ranges via firewall rules, disable remote administration if not operationally required, implement network segmentation isolating affected devices from untrusted networks. Organizations should verify device necessity and consider replacement if vendor discontinues support. Consult https://nvd.nist.gov/vuln/detail/CVE-2025-50653 for updated remediation guidance as vendor response develops.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2025-209334 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy