A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /xwgl_ref.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request with excessively long strings in parameters name, en, user_id, shibie_name, time, act, log, and rpri.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Buffer Overflow in D‑Link DI‑8003 /xwgl_ref.asp Allows Remote Attack | |
| First Time appeared |
Dlink
Dlink di-8003 |
|
| Weaknesses | CWE-119 CWE-787 |
|
| Vendors & Products |
Dlink
Dlink di-8003 |
Wed, 08 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /xwgl_ref.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request with excessively long strings in parameters name, en, user_id, shibie_name, time, act, log, and rpri. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-08T17:48:58.663Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50671
No data.
Status : Received
Published: 2026-04-08T19:24:17.803
Modified: 2026-04-08T19:24:17.803
Link: CVE-2025-50671
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:45:04Z