Dlink

Dir-816 Firmware

70 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.1%
  • Veröffentlicht 15.03.2026 17:32:09
  • Zuletzt bearbeitet 19.03.2026 19:20:44

A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi of the component goahead. Performing a manipulation of the argument pskValue results in st...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 15.03.2026 16:32:09
  • Zuletzt bearbeitet 19.03.2026 19:56:48

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overf...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 15.03.2026 16:02:15
  • Zuletzt bearbeitet 19.03.2026 19:57:16

A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buf...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 15.03.2026 16:02:10
  • Zuletzt bearbeitet 19.03.2026 19:58:46

A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-base...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 15.03.2026 13:32:10
  • Zuletzt bearbeitet 19.03.2026 19:59:21

A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be ...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 13.11.2025 00:00:00
  • Zuletzt bearbeitet 17.11.2025 17:57:15

A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1.10CNB05_R1B011D88210.img in the upload.cgi module, which handles firmware version information. The vulnerability occurs because /proc/version is read ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 09.10.2025 00:00:00
  • Zuletzt bearbeitet 29.10.2025 13:55:42

D-Link DIR-816A2_FWv1.10CNB05 was discovered to contain a stack overflow via the statuscheckpppoeuser parameter in the dir_setWanWifi function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

Exploit
  • EPSS 1.82%
  • Veröffentlicht 30.06.2025 00:00:00
  • Zuletzt bearbeitet 08.07.2025 14:13:39

An issue D-Link DIR-816-A2 DIR-816A2_FWv1.10CNB05_R1B011D88210 allows a remote attacker to execute arbitrary code via system() function in the bin/goahead file

Exploit
  • EPSS 0.88%
  • Veröffentlicht 05.06.2025 02:00:23
  • Zuletzt bearbeitet 06.06.2025 15:15:04

A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. This vulnerability affects unknown code of the file /goform/form2lansetup.cgi. The manipulation of the argument ip leads to stack-based buffer overflow. The attack...

Exploit
  • EPSS 0.88%
  • Veröffentlicht 05.06.2025 00:31:05
  • Zuletzt bearbeitet 06.06.2025 15:42:51

A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been declared as critical. This vulnerability affects the function QoSPortSetup of the file /goform/QoSPortSetup. The manipulation of the argument port0_group/port0_remarker/ssid0_group/ss...