Product:

Dir\-816_firmware

(Dlink)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 54
Date Id Summary Products Score Patch Annotated
2019-03-25 CVE-2019-10042 The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/LoadDefaultSettings to reset the router without authentication. Dir\-816_firmware 7.5
2019-03-25 CVE-2019-10041 The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/form2userconfig.cgi to edit the system account without authentication. Dir\-816_firmware 9.8
2019-03-25 CVE-2019-10040 The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use a hidden API URL /goform/SystemCommand to execute a system command without authentication. Dir\-816_firmware 9.8
2019-03-25 CVE-2019-10039 The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/setSysAdm to edit the web or system account without authentication. Dir\-816_firmware 9.8