Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f27h-vmvh-757r

Опубликовано: 16 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 8.9
CVSS3: 9.8

Описание

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

EPSS

Процентиль: 27%
0.00097
Низкий

8.9 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 9.8
nvd
22 дня назад

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 9.8
fstec
около 1 месяца назад

Уязвимость файла /goform/form2WlanBasicSetup.cgi компонента goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-816, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 27%
0.00097
Низкий

8.9 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-119
CWE-787