EUVD-2025-209337

| CVE-2025-50655 HIGH
2026-04-08 mitre
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209337
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name parameter in the /thd_group.asp endpoint.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote denial-of-service attacks through malformed name parameter in /thd_group.asp endpoint. Improper input validation triggers stack-based buffer overflow, causing device crashes or service disruption without requiring user interaction. Attack vector is network-accessible with low complexity. No public exploit identified at time of analysis.

Technical Context

Stack-based buffer overflow (CWE-121) occurs when processing unchecked name parameter length in web interface endpoint /thd_group.asp. Vulnerable firmware version 16.07.26A1 lacks boundary validation, allowing oversized inputs to corrupt stack memory. Network-accessible attack surface (AV:N) with no authentication requirement (PR:N) enables trivial exploitation targeting availability.

Affected Products

D-Link DI-8003 industrial router, firmware version 16.07.26A1. Vendor D-Link Corporation. Precise CPE unavailable due to incomplete vendor product classification data.

Remediation

No vendor-released patch identified at time of analysis. Consult D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ for updated firmware releases addressing CVE-2025-50655. Until patched firmware becomes available, implement network segmentation to restrict administrative interface access to trusted management networks only. Deploy web application firewall rules filtering excessive parameter lengths on /thd_group.asp endpoint. Consider replacing affected devices if vendor discontinues support for DI-8003 model line. Monitor vendor advisory portal for patch availability announcements.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2025-209337 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy