Vulnerabilities (CVE)

Filtered by vendor Dlink Subscribe
Filtered by product Dir-816
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-42999 1 Dlink 2 Dir-816, Dir-816 Firmware 2023-08-08 N/A 7.5 HIGH
D-Link DIR-816 A2 1.10 B05 was discovered to contain multiple command injection vulnerabilities via the admuser and admpass parameters at /goform/setSysAdm.
CVE-2022-37129 1 Dlink 2 Dir-816, Dir-816 Firmware 2023-08-08 N/A 8.8 HIGH
D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/SystemCommand. After the user passes in the command parameter, it will be spliced into byte_4836B0 by snprintf, and finally doSystem(&byte_4836B0); will be executed, resulting in a command injection.
CVE-2022-37123 1 Dlink 2 Dir-816, Dir-816 Firmware 2023-08-08 N/A 8.8 HIGH
D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/form2userconfig.cgi.
CVE-2022-36620 1 Dlink 2 Dir-816, Dir-816 Firmware 2023-08-08 N/A 7.5 HIGH
D-link DIR-816 A2_v1.10CNB04, DIR-878 DIR_878_FW1.30B08.img is vulnerable to Buffer Overflow via /goform/addRouting.
CVE-2019-7642 1 Dlink 10 Dir-816, Dir-816 Firmware, Dir-816l and 7 more 2021-04-23 5.0 MEDIUM 7.5 HIGH
D-Link routers with the mydlink feature have some web interfaces without authentication requirements. An attacker can remotely obtain users' DNS query logs and login logs. Vulnerable targets include but are not limited to the latest firmware versions of DIR-817LW (A1-1.04), DIR-816L (B1-2.06), DIR-816 (B1-2.06?), DIR-850L (A1-1.09), and DIR-868L (A1-1.10).
CVE-2019-10042 1 Dlink 2 Dir-816, Dir-816 Firmware 2020-08-24 7.8 HIGH 7.5 HIGH
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/LoadDefaultSettings to reset the router without authentication.