Количество 3
Количество 3
CVE-2026-4184
A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi of the component goahead. Performing a manipulation of the argument pskValue results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
GHSA-ghg2-4grw-v95p
A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi of the component goahead. Performing a manipulation of the argument pskValue results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
BDU:2026-04452
Уязвимость файла /goform/form2Wl5BasicSetup.cgi компонента goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-816, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-4184 A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi of the component goahead. Performing a manipulation of the argument pskValue results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | CVSS3: 9.8 | 0% Низкий | 22 дня назад | |
GHSA-ghg2-4grw-v95p A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi of the component goahead. Performing a manipulation of the argument pskValue results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | CVSS3: 9.8 | 0% Низкий | 22 дня назад | |
BDU:2026-04452 Уязвимость файла /goform/form2Wl5BasicSetup.cgi компонента goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-816, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | около 1 месяца назад |
Уязвимостей на страницу