Количество 3
Количество 3
CVE-2026-4182
A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
GHSA-jmxw-gwqc-xrm5
A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
BDU:2026-04454
Уязвимость файла /goform/form2Wl5RepeaterStep2.cgi компонента goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-816, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-4182 A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer. | CVSS3: 9.8 | 0% Низкий | 22 дня назад | |
GHSA-jmxw-gwqc-xrm5 A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer. | CVSS3: 9.8 | 0% Низкий | 22 дня назад | |
BDU:2026-04454 Уязвимость файла /goform/form2Wl5RepeaterStep2.cgi компонента goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-816, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | около 1 месяца назад |
Уязвимостей на страницу