EUVD-2025-209343

| CVE-2025-50660 HIGH
2026-04-08 mitre GHSA-82r6-wpf9-w38m
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209343
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name parameter in the /url_member.asp endpoint.

Analysis

Stack-based buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 allows unauthenticated remote attackers to trigger denial-of-service conditions by sending malformed name parameter values to the /url_member.asp endpoint. The vulnerability enables network-accessible attackers to crash the device without authentication or user interaction, disrupting availability of routing services. No public exploit identified at time of analysis.

Technical Context

CWE-121 stack-based buffer overflow caused by insufficient bounds checking on the name parameter in /url_member.asp. The firmware fails to validate input length before copying data to a fixed-size stack buffer, allowing oversized values to corrupt adjacent memory regions and destabilize the web management interface.

Affected Products

D-Link DI-8003 Industrial Gigabit VPN Router, firmware version 16.07.26A1. Vendor: D-Link Corporation. No granular CPE available.

Remediation

No vendor-released patch identified at time of analysis. Consult D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ for official remediation guidance. Until patched firmware becomes available, restrict network access to the web management interface (/url_member.asp) through firewall rules permitting only trusted administrator IP addresses. Disable remote management features if not operationally required. Consider deploying network segmentation to isolate affected routers from untrusted networks. Monitor D-Link support channels for firmware updates addressing CVE-2025-50660. Contact D-Link technical support directly for enterprise deployment guidance.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2025-209343 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy