Lucene search

K
DlinkDir-816 Firmware

5 matches found

CVE
CVE
added 2021/08/24 7:15 p.m.45 views

CVE-2021-39510

An issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router, The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell me...

9.8CVSS9.7AI score0.08842EPSS
CVE
CVE
added 2021/03/30 2:15 p.m.37 views

CVE-2021-26810

D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser paramete...

10CVSS9.8AI score0.31799EPSS
CVE
CVE
added 2021/08/24 7:15 p.m.35 views

CVE-2021-39509

An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metac...

9.8CVSS9.7AI score0.21234EPSS
CVE
CVE
added 2021/04/14 2:15 p.m.34 views

CVE-2021-27114

An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/addassignment route, a very long text entry for the"'s_ip" and "s_mac" fields could lead to a Stack-Based Buffer Overflow and overwrite the return address.

9.8CVSS9.3AI score0.01359EPSS
CVE
CVE
added 2021/04/14 2:15 p.m.32 views

CVE-2021-27113

An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters.

10CVSS9.6AI score0.28613EPSS