Dlink

Dir-816 Firmware

73 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.07%
  • Veröffentlicht 11.05.2026 23:15:13
  • Zuletzt bearbeitet 12.05.2026 19:55:06

A vulnerability was detected in D-Link DIR-816 1.10CNB05_R1B011D88210. This affects the function portForward. Performing a manipulation of the argument ip_address results in command injection. The attack can be initiated remotely. The exploit is now ...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 11.05.2026 22:00:14
  • Zuletzt bearbeitet 12.05.2026 19:55:38

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05_R1B011D88210. Affected by this issue is the function sub_445E7C of the file /goform/singlePortForward. Such manipulation of the argument ip_address leads to command injection. It ...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 11.05.2026 21:30:12
  • Zuletzt bearbeitet 12.05.2026 19:56:03

A weakness has been identified in D-Link DIR-816 1.10CNB05_R1B011D88210. Affected by this vulnerability is the function sub_445E7C of the file /goform/formDMZ.cgi. This manipulation causes command injection. It is possible to initiate the attack remo...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 15.03.2026 17:32:09
  • Zuletzt bearbeitet 19.03.2026 19:20:44

A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi of the component goahead. Performing a manipulation of the argument pskValue results in st...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 15.03.2026 16:32:09
  • Zuletzt bearbeitet 19.03.2026 19:56:48

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overf...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 15.03.2026 16:02:15
  • Zuletzt bearbeitet 19.03.2026 19:57:16

A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buf...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 15.03.2026 16:02:10
  • Zuletzt bearbeitet 06.04.2026 14:12:57

A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-base...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 15.03.2026 13:32:10
  • Zuletzt bearbeitet 29.04.2026 01:00:01

A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be ...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 13.11.2025 00:00:00
  • Zuletzt bearbeitet 17.11.2025 17:57:15

A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1.10CNB05_R1B011D88210.img in the upload.cgi module, which handles firmware version information. The vulnerability occurs because /proc/version is read ...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 09.10.2025 00:00:00
  • Zuletzt bearbeitet 29.10.2025 13:55:42

D-Link DIR-816A2_FWv1.10CNB05 was discovered to contain a stack overflow via the statuscheckpppoeuser parameter in the dir_setWanWifi function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.