Impact
A vulnerability has been identified in D‑Link DIR‑816 firmware version 1.10CNB05. The flaw exists within the goahead component’s redirect.asp file, where manipulating the token_id argument can bypass intended access controls. This improper authorization can allow an attacker to gain unauthorized administrative or configuration access to the device. The weakness is classified under CWE‑266 and CWE‑284.
Affected Systems
The affected product is the D‑Link DIR‑816 running firmware version 1.10CNB05. No other firmware versions or variants are explicitly stated as vulnerable in the CVE data.
Risk and Exploitability
The CVSS score of 6.9 indicates medium severity, while the EPSS score is reported as less than 1 %. The vulnerability is not listed in the CISA KEV catalog. Attack code is publicly available, and the exploit can be initiated remotely, which means that unsupported devices remain at a moderate to high risk until a firmware update is obtained or mitigations are applied.
OpenCVE Enrichment