Lucene search

K
DlinkDir-816 Firmware

63 matches found

CVE
CVE
added 2025/01/02 12:15 p.m.40 views

CVE-2024-13107

A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. It has been classified as critical. This affects an unknown part of the file /goform/form2LocalAclEditcfg.cgi of the component ACL Handler. The manipulation leads to improper access controls. It is possible to initiate the attac...

6.9CVSS5.4AI score0.00054EPSS
CVE
CVE
added 2022/08/22 3:15 p.m.39 views

CVE-2022-37134

D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/form2Wan.cgi. When wantype is 3, l2tp_usrname will be decrypted by base64, and the result will be stored in v94, which does not check the size of l2tp_usrname, resulting in stack overflow.

9.8CVSS9.4AI score0.0995EPSS
CVE
CVE
added 2024/02/08 6:15 p.m.39 views

CVE-2024-24321

An issue in Dlink DIR-816A2 v.1.10CNB05 allows a remote attacker to execute arbitrary code via the wizardstep4_ssid_2 parameter in the sub_42DA54 function.

9.8CVSS9.6AI score0.03222EPSS
CVE
CVE
added 2019/03/25 7:29 p.m.37 views

CVE-2019-10042

The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/LoadDefaultSettings to reset the router without authentication.

7.8CVSS7.4AI score0.00657EPSS
CVE
CVE
added 2021/03/30 2:15 p.m.37 views

CVE-2021-26810

D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser paramete...

10CVSS9.8AI score0.31799EPSS
CVE
CVE
added 2022/08/31 11:15 p.m.37 views

CVE-2022-37129

D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/SystemCommand. After the user passes in the command parameter, it will be spliced into byte_4836B0 by snprintf, and finally doSystem(&byte_4836B0); will be executed, resulting in a command injection.

8.8CVSS9.4AI score0.02545EPSS
CVE
CVE
added 2023/09/12 12:15 p.m.37 views

CVE-2023-39637

D-Link DIR-816 A2 1.10 B05 was discovered to contain a command injection vulnerability via the component /goform/Diagnosis.

9.8CVSS9.7AI score0.00957EPSS
CVE
CVE
added 2021/08/24 7:15 p.m.35 views

CVE-2021-39509

An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metac...

9.8CVSS9.7AI score0.21234EPSS
CVE
CVE
added 2021/04/14 2:15 p.m.34 views

CVE-2021-27114

An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/addassignment route, a very long text entry for the"'s_ip" and "s_mac" fields could lead to a Stack-Based Buffer Overflow and overwrite the return address.

9.8CVSS9.3AI score0.01359EPSS
CVE
CVE
added 2019/03/25 7:29 p.m.33 views

CVE-2019-10041

The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/form2userconfig.cgi to edit the system account without authentication.

9.8CVSS9.3AI score0.00769EPSS
CVE
CVE
added 2021/04/14 2:15 p.m.32 views

CVE-2021-27113

An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters.

10CVSS9.6AI score0.28613EPSS
CVE
CVE
added 2024/02/21 9:15 p.m.30 views

CVE-2023-24331

Command Injection vulnerability in D-Link Dir 816 with firmware version DIR-816_A2_v1.10CNB04 allows attackers to run arbitrary commands via the urlAdd parameter.

9.8CVSS7.6AI score0.04385EPSS
CVE
CVE
added 2025/06/30 5:15 p.m.10 views

CVE-2025-45931

An issue D-Link DIR-816-A2 DIR-816A2_FWv1.10CNB05_R1B011D88210 allows a remote attacker to execute arbitrary code via system() function in the bin/goahead file

9.8CVSS7.5AI score0.00307EPSS
Total number of security vulnerabilities63