CVE-2026-4182
D-Link DIR-816 goahead form2Wl5RepeaterStep2.cgi stack-based overflow
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
| CWE | CWE-121 CWE-119 |
| Vendor | d-link |
| Product | dir-816 |
| Published | Mar 15, 2026 |
| Last Updated | Mar 16, 2026 |
Stay Ahead of the Next One
Get instant alerts for d-link dir-816
Be the first to know when new critical vulnerabilities affecting d-link dir-816 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
D-Link / DIR-816
1.10CNB05
References
Credits
๐ pjqwudi (VulDB User)