Vulnerabilities (CVE)

Filtered by vendor Dlink Subscribe
Filtered by product Dir-816 Firmware
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-28915 1 Dlink 2 Dir-816, Dir-816 Firmware 2023-08-08 10.0 HIGH 9.8 CRITICAL
D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a command injection vulnerability via the admuser and admpass parameters in /goform/setSysAdm.
CVE-2022-37134 1 Dlink 2 Dir-816, Dir-816 Firmware 2023-08-08 N/A 9.8 CRITICAL
D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/form2Wan.cgi. When wantype is 3, l2tp_usrname will be decrypted by base64, and the result will be stored in v94, which does not check the size of l2tp_usrname, resulting in stack overflow.
CVE-2022-37130 1 Dlink 2 Dir-816, Dir-816 Firmware 2023-08-08 N/A 9.8 CRITICAL
In D-Link DIR-816 A2_v1.10CNB04, DIR-878 DIR_878_FW1.30B08.img a command injection vulnerability occurs in /goform/Diagnosis, after the condition is met, setnum will be spliced into v10 by snprintf, and the system will be executed, resulting in a command injection vulnerability
CVE-2021-31326 1 Dlink 2 Dir-816, Dir-816 Firmware 2022-07-12 9.0 HIGH 9.8 CRITICAL
D-Link DIR-816 A2 1.10 B05 allows unauthenticated attackers to arbitrarily reset the device via a crafted tokenid parameter to /goform/form2Reboot.cgi.
CVE-2021-26810 1 Dlink 2 Dir-816, Dir-816 Firmware 2022-07-12 10.0 HIGH 9.8 CRITICAL
D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser parameter.
CVE-2022-29327 1 Dlink 2 Dir-816, Dir-816 Firmware 2022-05-16 10.0 HIGH 9.8 CRITICAL
D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the urladd parameter in /goform/websURLFilterAddDel.
CVE-2022-29326 1 Dlink 2 Dir-816, Dir-816 Firmware 2022-05-16 10.0 HIGH 9.8 CRITICAL
D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the addhostfilter parameter in /goform/websHostFilter.
CVE-2022-29325 1 Dlink 2 Dir-816, Dir-816 Firmware 2022-05-16 10.0 HIGH 9.8 CRITICAL
D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the addurlfilter parameter in /goform/websURLFilter.
CVE-2022-29324 1 Dlink 2 Dir-816, Dir-816 Firmware 2022-05-16 10.0 HIGH 9.8 CRITICAL
D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the proto parameter in /goform/form2IPQoSTcAdd.
CVE-2022-29323 1 Dlink 2 Dir-816, Dir-816 Firmware 2022-05-16 10.0 HIGH 9.8 CRITICAL
D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the MAC parameter in /goform/editassignment.
CVE-2022-29322 1 Dlink 2 Dir-816, Dir-816 Firmware 2022-05-16 10.0 HIGH 9.8 CRITICAL
D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the IPADDR and nvmacaddr parameters in /goform/form2Dhcpip.
CVE-2022-29321 1 Dlink 2 Dir-816, Dir-816 Firmware 2022-05-16 10.0 HIGH 9.8 CRITICAL
D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the lanip parameter in /goform/setNetworkLan.
CVE-2021-39509 1 Dlink 2 Dir-816, Dir-816 Firmware 2021-09-01 7.5 HIGH 9.8 CRITICAL
An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters.
CVE-2021-39510 1 Dlink 2 Dir-816, Dir-816 Firmware 2021-09-01 7.5 HIGH 9.8 CRITICAL
An issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router, The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters.
CVE-2021-27113 1 Dlink 2 Dir-816, Dir-816 Firmware 2021-04-20 10.0 HIGH 9.8 CRITICAL
An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters.
CVE-2021-27114 1 Dlink 2 Dir-816, Dir-816 Firmware 2021-04-20 7.5 HIGH 9.8 CRITICAL
An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/addassignment route, a very long text entry for the"'s_ip" and "s_mac" fields could lead to a Stack-Based Buffer Overflow and overwrite the return address.
CVE-2019-10040 1 Dlink 2 Dir-816, Dir-816 Firmware 2020-08-24 10.0 HIGH 9.8 CRITICAL
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use a hidden API URL /goform/SystemCommand to execute a system command without authentication.
CVE-2019-10041 1 Dlink 2 Dir-816, Dir-816 Firmware 2020-08-24 5.0 MEDIUM 9.8 CRITICAL
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/form2userconfig.cgi to edit the system account without authentication.
CVE-2019-10039 1 Dlink 2 Dir-816, Dir-816 Firmware 2020-08-24 5.0 MEDIUM 9.8 CRITICAL
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/setSysAdm to edit the web or system account without authentication.