EUVD-2025-209362

| CVE-2025-50672 HIGH
2026-04-08 mitre GHSA-mwg9-68x8-fgcp
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 19:31 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 19:31 euvd
EUVD-2025-209362
CVE Published
Apr 08, 2026 - 00:00 nvd
HIGH 7.5

Description

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /yyxz_dlink.asp endpoint.

Analysis

Buffer overflow in D-Link DI-8003 router firmware 16.07.26A1 via /yyxz_dlink.asp endpoint enables unauthenticated network-based denial of service attacks. Improper parameter validation allows remote attackers to crash the device or trigger service interruption without authentication, user interaction, or elevated privileges. CVSS 7.5 (High) severity reflects network accessibility and availability impact. No public exploit identified at time of analysis. Low observed exploitation activity (EPSS 0.02%).

Technical Context

CWE-120 classic buffer overflow in web management interface parameter processing. Unbounded copy operation on /yyxz_dlink.asp input triggers memory corruption, destabilizing device availability. CVSS vector PR:N confirms unauthenticated remote attack surface. Affects embedded router firmware lacking input sanitization.

Affected Products

D-Link DI-8003 router, firmware version 16.07.26A1. Vendor: D-Link Corporation. Specific CPE unavailable; affects named firmware release only.

Remediation

No vendor-released patch identified at time of analysis. Consult D-Link Security Bulletin at https://www.dlink.com/en/security-bulletin/ for official updates and firmware availability. Until patched firmware releases, restrict administrative interface access using firewall rules to trusted management networks only, disable remote web management if not operationally required, and monitor device logs for abnormal connection patterns to /yyxz_dlink.asp. Consider hardware replacement if vendor discontinues support. Verify current support status via D-Link product lifecycle documentation before deployment in production environments.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2025-209362 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy