CVE-2025-50662
Published: 08 April 2026
Summary
CVE-2025-50662 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Dlink Di-8003 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the buffer overflow flaw in the /url_group.asp endpoint through timely patching as advised in D-Link security bulletin SAP10505.
Enforces validation of the name parameter to prevent buffer overflows from improper input handling in the web endpoint.
Limits the effects of denial-of-service caused by device crashes or reboots from successful buffer overflow exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated buffer overflow in public web endpoint (/url_group.asp) directly enables T1190 exploitation of public-facing application; resulting device crash/reboot matches T1499.004 application/system exploitation for DoS.
NVD Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name parameter in the /url_group.asp endpoint.
Deeper analysisAI
CVE-2025-50662, published on 2026-04-08, is a buffer overflow vulnerability classified under CWE-121 in the D-Link DI-8003 device running firmware version 16.07.26A1. The flaw stems from improper handling of the name parameter in the /url_group.asp endpoint, earning a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
An unauthenticated remote attacker with network access to the affected device can exploit this vulnerability through low-complexity attacks requiring no user interaction. Exploitation triggers a buffer overflow, resulting in a denial-of-service condition with high availability impact, such as device crashes or reboots, while confidentiality and integrity remain unaffected.
D-Link has published security advisory SAP10505 at https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10505 and maintains a security bulletin page at https://www.dlink.com/en/security-bulletin/. Further details appear in the IoT vulnerability collection on GitHub at https://github.com/xiaotea/iot-vulnerability-collection/blob/main/README.md. Security practitioners should review these resources for recommended patches and mitigation guidance.
Details
- CWE(s)