Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Dir\-816_firmware
(Dlink)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 54 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-08-22 | CVE-2022-37133 | D-link DIR-816 A2_v1.10CNB04.img reboots the router without authentication via /goform/doReboot. No authentication is required, and reboot is executed when the function returns at the end. | Dir\-816_firmware | 7.5 | ||
2022-08-22 | CVE-2022-37134 | D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/form2Wan.cgi. When wantype is 3, l2tp_usrname will be decrypted by base64, and the result will be stored in v94, which does not check the size of l2tp_usrname, resulting in stack overflow. | Dir\-816_firmware | 9.8 | ||
2022-08-31 | CVE-2022-37128 | In D-Link DIR-816 A2_v1.10CNB04.img the network can be initialized without authentication via /goform/wizard_end. | Dir\-816_firmware | 9.8 | ||
2022-08-31 | CVE-2022-36620 | D-link DIR-816 A2_v1.10CNB04, DIR-878 DIR_878_FW1.30B08.img is vulnerable to Buffer Overflow via /goform/addRouting. | Dir\-816_firmware | 7.5 | ||
2022-08-31 | CVE-2022-37125 | D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/NTPSyncWithHost. | Dir\-816_firmware | 9.8 | ||
2022-08-31 | CVE-2022-36619 | In D-link DIR-816 A2_v1.10CNB04.img,the network can be reset without authentication via /goform/setMAC. | Dir\-816_firmware | 7.5 | ||
2022-08-31 | CVE-2022-37123 | D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/form2userconfig.cgi. | Dir\-816_firmware | 8.8 | ||
2022-08-31 | CVE-2022-37129 | D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/SystemCommand. After the user passes in the command parameter, it will be spliced into byte_4836B0 by snprintf, and finally doSystem(&byte_4836B0); will be executed, resulting in a command injection. | Dir\-816_firmware | 8.8 | ||
2022-08-31 | CVE-2022-37130 | In D-Link DIR-816 A2_v1.10CNB04, DIR-878 DIR_878_FW1.30B08.img a command injection vulnerability occurs in /goform/Diagnosis, after the condition is met, setnum will be spliced into v10 by snprintf, and the system will be executed, resulting in a command injection vulnerability | Dir\-816_firmware | 9.8 | ||
2023-09-12 | CVE-2023-39637 | D-Link DIR-816 A2 1.10 B05 was discovered to contain a command injection vulnerability via the component /goform/Diagnosis. | Dir\-816_firmware | 9.8 |