A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /user_group.asp endpoint. The attacker can exploit this vulnerability by sending a crafted HTTP GET request with parameters name, mem, pri, and attr.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Buffer Overflow in D‑Link DI‑8003 /user_group.asp Allows Remote Code Execution | |
| First Time appeared |
Dlink
Dlink di-8003 |
|
| Weaknesses | CWE-119 | |
| Vendors & Products |
Dlink
Dlink di-8003 |
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /user_group.asp endpoint. The attacker can exploit this vulnerability by sending a crafted HTTP GET request with parameters name, mem, pri, and attr. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-08T17:37:29.022Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50664
No data.
Status : Awaiting Analysis
Published: 2026-04-08T19:24:17.033
Modified: 2026-04-08T21:26:13.410
Link: CVE-2025-50664
No data.
OpenCVE Enrichment
Updated: 2026-04-08T20:12:52Z
Weaknesses