Количество 3
Количество 3
CVE-2026-4181
A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
GHSA-3v32-rh46-55wq
A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
BDU:2026-04455
Уязвимость файла /goform/form2RepeaterStep2.cgi компонента goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-816, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-4181 A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer. | CVSS3: 9.8 | 0% Низкий | 22 дня назад | |
GHSA-3v32-rh46-55wq A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer. | CVSS3: 9.8 | 0% Низкий | 22 дня назад | |
BDU:2026-04455 Уязвимость файла /goform/form2RepeaterStep2.cgi компонента goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-816, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | около 1 месяца назад |
Уязвимостей на страницу