Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6ggg-vqm9-w733

Опубликовано: 16 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 5.5
CVSS3: 7.3

Описание

A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

EPSS

Процентиль: 16%
0.00052
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-266

Связанные уязвимости

CVSS3: 7.3
nvd
28 дней назад

A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 7.3
fstec
около 1 месяца назад

Уязвимость файла redirect.asp компонента goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-816, позволяющая нарушителю получить доступ к странице redirect.asp и раскрыть token_id

EPSS

Процентиль: 16%
0.00052
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-266