ID

VAR-202604-1896


CVE

CVE-2025-52222


TITLE

D-Link Corporation of di-8003  Classic buffer overflow vulnerabilities in multiple products, including firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-011046

DESCRIPTION

D-Link DI-8003 v16.07.26A1, DI-8500 v16.07.26A1; DI-8003G v17.12.21A1, DI-8200G v17.12.20A1, DI-8200 v16.07.26A1, DI-8400 v16.07.26A1, DI-8004w v16.07.26A1, DI-8100 v16.07.26A1, and DI-8100G v17.12.20A1 were discovered to contain a buffer overflow via the rd_en, rd_auth, rd_acct, http_hadmin, http_hadminpwd, rd_key, and rd_ip parameters in the radius_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. DoS ) attacks.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2025-52222 // JVNDB: JVNDB-2026-011046

AFFECTED PRODUCTS

vendor:dlinkmodel:di-8003gscope:eqversion:17.12.21a1

Trust: 1.0

vendor:dlinkmodel:di-8003scope:eqversion:16.07.26a1

Trust: 1.0

vendor:dlinkmodel:di-8200scope:eqversion:16.07.26a1

Trust: 1.0

vendor:dlinkmodel:di-8200gscope:eqversion:17.12.20a1

Trust: 1.0

vendor:dlinkmodel:di-8100scope:eqversion:16.07.26a1

Trust: 1.0

vendor:dlinkmodel:di-8004wscope:eqversion:16.07.26a1

Trust: 1.0

vendor:dlinkmodel:di-8500scope:eqversion:16.07.26a1

Trust: 1.0

vendor:dlinkmodel:di-8400scope:eqversion:16.07.26a1

Trust: 1.0

vendor:dlinkmodel:di-8100gscope:eqversion:17.12.20a1

Trust: 1.0

vendor:d linkmodel:di-8200scope: - version: -

Trust: 0.8

vendor:d linkmodel:di-8100scope: - version: -

Trust: 0.8

vendor:d linkmodel:di-8003scope: - version: -

Trust: 0.8

vendor:d linkmodel:di-8400scope: - version: -

Trust: 0.8

vendor:d linkmodel:di-8200gscope: - version: -

Trust: 0.8

vendor:d linkmodel:di-8100gscope: - version: -

Trust: 0.8

vendor:d linkmodel:di-8500scope: - version: -

Trust: 0.8

vendor:d linkmodel:di-8004wscope: - version: -

Trust: 0.8

vendor:d linkmodel:di-8003gscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-011046 // NVD: CVE-2025-52222

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2025-52222
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-52222
value: HIGH

Trust: 1.0

NVD: CVE-2025-52222
value: HIGH

Trust: 0.8

nvd@nist.gov: CVE-2025-52222
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2025-52222
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-011046 // NVD: CVE-2025-52222 // NVD: CVE-2025-52222

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-011046 // NVD: CVE-2025-52222

PATCH

title:Security Bulletin | D-Link GitHubGitHuburl:https://www.dlink.com/en/security-bulletin/

Trust: 0.8

sources: JVNDB: JVNDB-2026-011046

EXTERNAL IDS

db:NVDid:CVE-2025-52222

Trust: 2.6

db:JVNDBid:JVNDB-2026-011046

Trust: 0.8

sources: JVNDB: JVNDB-2026-011046 // NVD: CVE-2025-52222

REFERENCES

url:https://github.com/xiaotea/iot-vulnerability-collection/blob/main/readme.md

Trust: 1.0

url:https://www.dlink.com/en/security-bulletin/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-52222

Trust: 0.8

sources: JVNDB: JVNDB-2026-011046 // NVD: CVE-2025-52222

SOURCES

db:JVNDBid:JVNDB-2026-011046
db:NVDid:CVE-2025-52222

LAST UPDATE DATE

2026-04-18T00:10:50.066000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-011046date:2026-04-16T01:36:00
db:NVDid:CVE-2025-52222date:2026-04-14T15:45:21.273

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-011046date:2026-04-16T00:00:00
db:NVDid:CVE-2025-52222date:2026-04-08T18:24:51.373