Description
A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 and DI-8003G 19.12.10A1 due to improper handling of the wan_ping parameter in the /wan_ping.asp endpoint.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a classic buffer overflow caused by improper handling of the wan_ping parameter in the /wan_ping.asp endpoint of D‑Link DI‑8003 and DI‑8003G devices. A properly crafted input could overwrite adjacent memory, allowing an attacker to execute arbitrary code. This flaw exposes the device to remote compromise, potentially enabling full control of the network gateway.

Affected Systems

The affected devices are D‑Link DI‑8003 running firmware version 16.07.26A1 and D‑Link DI‑8003G running firmware version 19.12.10A1. These models expose the vulnerable endpoint on the device’s web interface and are commonly used in small office and home‑office environments.

Risk and Exploitability

The CVSS score of 7.5 categorizes the vulnerability as high severity, while the EPSS score of less than 1% suggests that automated exploitation attempts are unlikely at present. The vulnerability is not listed in the CISA’s KEV catalog, indicating no known widespread exploitation yet. The most probable attack vector is remote, with an adversary sending a malicious request to the /wan_ping.asp page over the device’s exposed HTTP interface. An attacker would need network access to the device’s management interface and the ability to craft an oversized wan_ping value, which can feasibly be achieved from an internal or compromised network.

Generated by OpenCVE AI on April 10, 2026 at 22:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update released by D‑Link that addresses the WAN ping buffer overflow.
  • If no update is available, disable the WAN ping feature through the device’s web interface or via configuration files.
  • Restrict access to the /wan_ping.asp endpoint by configuring the device’s firewall to allow only trusted internal IP addresses.
  • Monitor the device’s access logs for unusual or repeated access attempts to the /wan.asp page.
  • Verify that firmware versions match the unvulnerable releases and maintain ongoing patch management.

Generated by OpenCVE AI on April 10, 2026 at 22:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003/DI‑8003G via Wan_Ping Parameter

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-8003
Dlink di-8003 Firmware
CPEs cpe:2.3:h:dlink:di-8003:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-8003_firmware:16.07.26a1:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink di-8003
Dlink di-8003 Firmware

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link di-8003
D-link di-8003g
Vendors & Products D-link
D-link di-8003
D-link di-8003g

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in D‑Link DI‑8003/DI‑8003G via Wan_Ping Parameter
Weaknesses CWE-120

Wed, 08 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 and DI-8003G 19.12.10A1 due to improper handling of the wan_ping parameter in the /wan_ping.asp endpoint.
References

Subscriptions

D-link Di-8003 Di-8003g
Dlink Di-8003 Di-8003 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-10T15:40:41.067Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50669

cve-icon Vulnrichment

Updated: 2026-04-10T15:37:12.077Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T19:24:17.580

Modified: 2026-04-10T21:14:31.353

Link: CVE-2025-50669

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:26:03Z

Weaknesses