EUVD-2025-209347

| CVE-2025-50662 HIGH
2026-04-08 mitre GHSA-93wf-gj63-8mcf
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209347
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name parameter in the /url_group.asp endpoint.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 enables unauthenticated remote denial-of-service attacks via crafted name parameter to /url_group.asp endpoint. Attackers can trigger stack-based buffer overflow remotely over network without user interaction, causing high availability impact through service disruption or device crash. No public exploit identified at time of analysis. CVSS 7.5 severity reflects network-accessible attack vector with low complexity.

Technical Context

Stack-based buffer overflow (CWE-121) in /url_group.asp endpoint lacks input validation on name parameter length. Improper bounds checking allows oversized input to corrupt stack memory, triggering denial-of-service condition. Attack requires no authentication (PR:N) and exploits web management interface directly accessible over network.

Affected Products

D-Link DI-8003 router, firmware version 16.07.26A1. Vendor: D-Link Corporation. Specific CPE unavailable in authoritative sources at time of analysis.

Remediation

No vendor-released patch identified at time of analysis. D-Link has not published specific security advisory addressing CVE-2025-50662 for DI-8003 16.07.26A1 firmware. Recommended immediate mitigations: restrict web management interface access to trusted internal networks only via firewall rules, disable remote administration if not operationally required, implement network segmentation isolating device from untrusted networks. Monitor D-Link security bulletin portal at https://www.dlink.com/en/security-bulletin/ for future firmware updates. Consider hardware replacement if device reaches end-of-support lifecycle. Low observed exploitation activity (EPSS <1%) suggests limited active targeting currently.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2025-209347 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy