Логотип exploitDog
bind:CVE-2026-4180
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-4180

Количество 3

Количество 3

nvd логотип

CVE-2026-4180

28 дней назад

A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-6ggg-vqm9-w733

28 дней назад

A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 7.3
EPSS: Низкий
fstec логотип

BDU:2026-04453

около 1 месяца назад

Уязвимость файла redirect.asp компонента goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-816, позволяющая нарушителю получить доступ к странице redirect.asp и раскрыть token_id

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-4180

A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 7.3
0%
Низкий
28 дней назад
github логотип
GHSA-6ggg-vqm9-w733

A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 7.3
0%
Низкий
28 дней назад
fstec логотип
BDU:2026-04453

Уязвимость файла redirect.asp компонента goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-816, позволяющая нарушителю получить доступ к странице redirect.asp и раскрыть token_id

CVSS3: 7.3
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу