Dlink

Dir-816 A2 Firmware

13 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.79%
  • Published 01.05.2025 00:00:00
  • Last modified 28.05.2025 16:02:44

D-Link DIR-816 A2V1.1.0B05 was found to contain a command injection in iptablesWebsFilterRun, which allows remote attackers to execute arbitrary commands via shell.

Exploit
  • EPSS 17.9%
  • Published 26.01.2024 14:15:50
  • Last modified 21.11.2024 08:47:44

A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setDeviceSettings of the component Web Interface. The manipulation of the argumen...

Exploit
  • EPSS 1.91%
  • Published 21.09.2023 13:15:10
  • Last modified 21.11.2024 08:23:51

D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter statuscheckpppoeuser in dir_setWanWifi.

Exploit
  • EPSS 1.91%
  • Published 21.09.2023 13:15:10
  • Last modified 21.11.2024 08:23:52

D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter macCloneMac in setMAC.

Exploit
  • EPSS 1.91%
  • Published 21.09.2023 13:15:10
  • Last modified 21.11.2024 08:23:52

D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter nvmacaddr in form2Dhcpip.cgi.

Exploit
  • EPSS 1.91%
  • Published 21.09.2023 13:15:10
  • Last modified 21.11.2024 08:23:52

D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter flag_5G in showMACfilterMAC.

Exploit
  • EPSS 1.91%
  • Published 21.09.2023 13:15:10
  • Last modified 21.11.2024 08:23:52

D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter sip_address in ipportFilter.

Exploit
  • EPSS 14.54%
  • Published 15.09.2018 21:29:00
  • Last modified 21.11.2024 03:53:48

An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/NTPSyncWithHost route. This could lead to command injection via shell metachara...

Exploit
  • EPSS 14.54%
  • Published 15.09.2018 21:29:00
  • Last modified 21.11.2024 03:53:48

An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/sylogapply route. This could lead to command injection via the syslogIp paramet...

Exploit
  • EPSS 0.7%
  • Published 15.09.2018 21:29:00
  • Last modified 21.11.2024 03:53:48

An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/DDNS route, a very long password could lead to a stack-based buffer overflow and overwrite the return address.