Dlink

Dir-816 Firmware

70 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.32%
  • Veröffentlicht 05.06.2025 00:00:19
  • Zuletzt bearbeitet 06.06.2025 15:42:32

A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to stack-based buffer...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 05.06.2025 00:00:16
  • Zuletzt bearbeitet 06.06.2025 15:42:38

A vulnerability was found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this issue is the function wirelessApcli_5g of the file /goform/wirelessApcli_5g. The manipulation of the argument apcli_mode_5g/apcli_enc_5g/apcli_default_...

Exploit
  • EPSS 1.35%
  • Veröffentlicht 04.06.2025 23:31:08
  • Zuletzt bearbeitet 06.06.2025 15:42:47

A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this vulnerability is the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to o...

Exploit
  • EPSS 1.35%
  • Veröffentlicht 04.06.2025 23:31:06
  • Zuletzt bearbeitet 06.06.2025 15:42:43

A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection. I...

Exploit
  • EPSS 9.01%
  • Veröffentlicht 22.04.2025 00:00:00
  • Zuletzt bearbeitet 30.04.2025 13:54:38

D-Link DIR-816 A2V1.1.0B05 was found to contain a command injection in /goform/delRouting.

  • EPSS 0.09%
  • Veröffentlicht 17.02.2025 16:15:16
  • Zuletzt bearbeitet 16.07.2025 14:26:19

A vulnerability has been found in D-Link DIR-816 1.01TO and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/webproc?getpage=html/index.html&var:menu=24gwlan&var:page=24G_basic. The manipulati...

  • EPSS 5.18%
  • Veröffentlicht 16.01.2025 19:15:29
  • Zuletzt bearbeitet 02.05.2025 19:31:55

An access control issue in the component formDMZ.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the DMZ service of the device via a crafted POST request.

  • EPSS 0.28%
  • Veröffentlicht 16.01.2025 19:15:29
  • Zuletzt bearbeitet 02.05.2025 19:31:40

An access control issue in the component form2Wan.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the wan service of the device via a crafted POST request.

  • EPSS 0.19%
  • Veröffentlicht 16.01.2025 19:15:29
  • Zuletzt bearbeitet 02.05.2025 19:31:42

An access control issue in the component form2WlAc.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G mac access control list of the device via a crafted POST request.

  • EPSS 0.22%
  • Veröffentlicht 16.01.2025 19:15:29
  • Zuletzt bearbeitet 02.05.2025 19:31:44

An access control issue in the component form2RepeaterSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G repeater service of the device via a crafted POST request.