CVE-2025-44835
- EPSS 1.79%
- Published 01.05.2025 00:00:00
- Last modified 28.05.2025 16:02:44
D-Link DIR-816 A2V1.1.0B05 was found to contain a command injection in iptablesWebsFilterRun, which allows remote attackers to execute arbitrary commands via shell.
CVE-2024-0921
- EPSS 17.9%
- Published 26.01.2024 14:15:50
- Last modified 21.11.2024 08:47:44
A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setDeviceSettings of the component Web Interface. The manipulation of the argumen...
CVE-2023-43236
- EPSS 1.91%
- Published 21.09.2023 13:15:10
- Last modified 21.11.2024 08:23:51
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter statuscheckpppoeuser in dir_setWanWifi.
CVE-2023-43237
- EPSS 1.91%
- Published 21.09.2023 13:15:10
- Last modified 21.11.2024 08:23:52
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter macCloneMac in setMAC.
CVE-2023-43238
- EPSS 1.91%
- Published 21.09.2023 13:15:10
- Last modified 21.11.2024 08:23:52
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter nvmacaddr in form2Dhcpip.cgi.
CVE-2023-43239
- EPSS 1.91%
- Published 21.09.2023 13:15:10
- Last modified 21.11.2024 08:23:52
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter flag_5G in showMACfilterMAC.
CVE-2023-43240
- EPSS 1.91%
- Published 21.09.2023 13:15:10
- Last modified 21.11.2024 08:23:52
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter sip_address in ipportFilter.
- EPSS 14.54%
- Published 15.09.2018 21:29:00
- Last modified 21.11.2024 03:53:48
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/NTPSyncWithHost route. This could lead to command injection via shell metachara...
- EPSS 14.54%
- Published 15.09.2018 21:29:00
- Last modified 21.11.2024 03:53:48
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/sylogapply route. This could lead to command injection via the syslogIp paramet...
- EPSS 0.7%
- Published 15.09.2018 21:29:00
- Last modified 21.11.2024 03:53:48
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/DDNS route, a very long password could lead to a stack-based buffer overflow and overwrite the return address.