CVE-2025-50655
Published: 08 April 2026
Summary
CVE-2025-50655 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Dlink Di-8003 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the buffer overflow by requiring validation of the name parameter in the /thd_group.asp endpoint to prevent oversized inputs.
Ensures timely remediation of the identified buffer overflow flaw through firmware patching as advised in D-Link's SAP10505 security advisory.
Provides memory protection mechanisms such as stack canaries or non-executable stacks to mitigate successful buffer overflow exploitation leading to DoS.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote buffer overflow in public web endpoint directly enables T1190 exploitation and T1499.004 application/system DoS via crash.
NVD Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name parameter in the /thd_group.asp endpoint.
Deeper analysisAI
CVE-2025-50655, published on 2026-04-08, is a buffer overflow vulnerability classified under CWE-121 in the D-Link DI-8003 device running firmware version 16.07.26A1. The flaw stems from improper handling of the name parameter in the /thd_group.asp endpoint, earning a CVSS v3.1 base score of 7.5.
An unauthenticated remote attacker with network access can exploit this vulnerability with low attack complexity and no user interaction required. Exploitation triggers a buffer overflow, resulting in a denial-of-service condition with high availability impact but no confidentiality or integrity effects, as reflected in the CVSS vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H.
D-Link has issued security advisories addressing this issue, including publication SAP10505 available at https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10505 and a general security bulletin at https://www.dlink.com/en/security-bulletin/. Further details appear in the IoT vulnerability collection on GitHub at https://github.com/xiaotea/iot-vulnerability-collection/blob/main/README.md.
Details
- CWE(s)