Description
A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-03-15
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Access Control
Action: Patch
AI Analysis

Impact

A vulnerability has been identified in D‑Link DIR‑816 firmware version 1.10CNB05. The flaw exists within the goahead component’s redirect.asp file, where manipulating the token_id argument can bypass intended access controls. This improper authorization can allow an attacker to gain unauthorized administrative or configuration access to the device. The weakness is classified under CWE‑266 and CWE‑284.

Affected Systems

The affected product is the D‑Link DIR‑816 running firmware version 1.10CNB05. No other firmware versions or variants are explicitly stated as vulnerable in the CVE data.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, while the EPSS score is reported as less than 1 %. The vulnerability is not listed in the CISA KEV catalog. Attack code is publicly available, and the exploit can be initiated remotely, which means that unsupported devices remain at a moderate to high risk until a firmware update is obtained or mitigations are applied.

Generated by OpenCVE AI on March 19, 2026 at 21:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the D‑Link website or contact support for a firmware update that addresses the redirect.asp access control flaw.
  • If an update is available, install it immediately on the DIR‑816 device.
  • If no firmware update exists, disable or restrict remote management functionality to trusted IP addresses only.
  • Monitor device logs for anomalous access attempts and consider blocking exploitation of the token_id parameter from external requests if possible.

Generated by OpenCVE AI on March 19, 2026 at 21:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-816
Dlink dir-816 Firmware
CPEs cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-816
Dlink dir-816 Firmware

Tue, 17 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-816
Vendors & Products D-link
D-link dir-816

Sun, 15 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-816 goahead redirect.asp access control
Weaknesses CWE-266
CWE-284
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-816
Dlink Dir-816 Dir-816 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-17T15:17:11.342Z

Reserved: 2026-03-14T21:56:54.201Z

Link: CVE-2026-4180

cve-icon Vulnrichment

Updated: 2026-03-17T15:17:06.200Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:58.563

Modified: 2026-03-19T19:59:21.393

Link: CVE-2026-4180

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:53Z

Weaknesses