CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Tags
Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 and DI-8003G 19.12.10A1 due to improper handling of the wan_ping parameter in the /wan_ping.asp endpoint.
Analysis
Buffer overflow in D-Link DI-8003 (16.07.26A1) and DI-8003G (19.12.10A1) routers enables unauthenticated remote denial-of-service through improper handling of the wan_ping parameter at the /wan_ping.asp endpoint. Network-accessible attack requires no user interaction or privileges. CVSS:3.1 score 7.5 (High) reflects availability impact. No public exploit identified at time of analysis. Low observed exploitation activity (EPSS 0.02%).
Technical Context
CWE-120 buffer overflow occurs when /wan_ping.asp endpoint processes oversized wan_ping parameter without bounds checking. Unauthenticated network access (CVSS AV:N, PR:N) enables memory corruption leading to service disruption. Vulnerability affects web management interface parsing routines in legacy D-Link router firmware versions.
Affected Products
D-Link DI-8003 firmware version 16.07.26A1, D-Link DI-8003G firmware version 19.12.10A1. Both models are network routers with exposed web management interfaces.
Remediation
Consult D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ for patched firmware releases addressing CVE-2025-50669. No vendor-released patch version independently confirmed at time of analysis. If updated firmware unavailable, disable remote web management access and restrict administrative interface to trusted internal networks only via firewall rules. Implement IP allowlisting for management access. Monitor https://nvd.nist.gov/vuln/detail/CVE-2025-50669 for updated vendor guidance. Consider replacement with actively supported hardware if D-Link issues end-of-life notice for affected models.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209359
GHSA-9vm7-74c3-v5fg