Dlink

Dir-816 Firmware

65 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.87%
  • Veröffentlicht 10.05.2022 14:15:09
  • Zuletzt bearbeitet 21.11.2024 06:58:54

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the MAC parameter in /goform/editassignment.

Exploit
  • EPSS 1.87%
  • Veröffentlicht 10.05.2022 14:15:09
  • Zuletzt bearbeitet 21.11.2024 06:58:54

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the proto parameter in /goform/form2IPQoSTcAdd.

Exploit
  • EPSS 1.5%
  • Veröffentlicht 10.05.2022 14:15:09
  • Zuletzt bearbeitet 21.11.2024 06:58:55

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the addhostfilter parameter in /goform/websHostFilter.

Exploit
  • EPSS 1.5%
  • Veröffentlicht 10.05.2022 14:15:09
  • Zuletzt bearbeitet 21.11.2024 06:58:55

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the urladd parameter in /goform/websURLFilterAddDel.

Exploit
  • EPSS 1.66%
  • Veröffentlicht 24.03.2022 00:15:08
  • Zuletzt bearbeitet 21.11.2024 06:05:26

D-Link DIR-816 A2 1.10 B05 allows unauthenticated attackers to arbitrarily reset the device via a crafted tokenid parameter to /goform/form2Reboot.cgi.

Exploit
  • EPSS 6.5%
  • Veröffentlicht 24.08.2021 19:15:33
  • Zuletzt bearbeitet 21.11.2024 06:19:34

An issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router, The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. Th...

Exploit
  • EPSS 16.34%
  • Veröffentlicht 24.08.2021 19:15:32
  • Zuletzt bearbeitet 21.11.2024 06:19:34

An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This ...

Exploit
  • EPSS 1.36%
  • Veröffentlicht 14.04.2021 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:22

An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/addassignment route, a very long text entry for the"'s_ip" and "s_mac" fields could lead to a Stack-Based Buffer Overflow and overwrite the retu...

Exploit
  • EPSS 30.98%
  • Veröffentlicht 14.04.2021 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:21

An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters...

Exploit
  • EPSS 34.28%
  • Veröffentlicht 30.03.2021 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:56:51

D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell me...