Description
A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-03-15
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Key detail from CVE description: a stack-based buffer overflow can be triggered by manipulating the arguments key1/key2/key3/key4/pskValue in the /goform/form2RepeaterStep2.cgi servlet of D‑Link DIR‑816 firmware 1.10CNB05. The control‑flow corruption allows an attacker to execute arbitrary code on the router, compromising confidentiality, integrity, and availability of the device and potentially the network it serves.

Affected Systems

Key detail from CVE description: only the D‑Link DIR‑816 model running firmware version 1.10CNB05 is affected. No other firmware versions or models are mentioned, and the vulnerability is stated to impact products that are no longer supported by the manufacturer.

Risk and Exploitability

The CVSS score of 9.3 indicates a critical severity level, and the EPSS score of <1% suggests low current exploit probability. The vulnerability is not listed in the KEV catalog. It is inferred that exploitation requires remote access to the router’s administrative interface over the network, targeting the form2RepeaterStep2.cgi endpoint. The public release of an exploit amplifies the risk if the device is still under network exposure.

Generated by OpenCVE AI on March 19, 2026 at 21:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from D‑Link for the DIR‑816 (if available).
  • If no update is available, consider upgrading to a supported router model or a different manufacturer.
  • Restrict external access to the router’s administrative interfaces by configuring firewall rules or ACLs.
  • Monitor network traffic for suspicious requests to /goform/form2RepeaterStep2.cgi.
  • Isolate the device from critical networks until a patch or mitigation is applied.

Generated by OpenCVE AI on March 19, 2026 at 21:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-816
Dlink dir-816 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-816
Dlink dir-816 Firmware

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-816
Vendors & Products D-link
D-link dir-816

Sun, 15 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-816 goahead form2RepeaterStep2.cgi stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-816
Dlink Dir-816 Dir-816 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T14:40:33.964Z

Reserved: 2026-03-14T21:56:59.156Z

Link: CVE-2026-4181

cve-icon Vulnrichment

Updated: 2026-03-16T14:36:36.640Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:58.797

Modified: 2026-04-06T14:12:57.947

Link: CVE-2026-4181

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:39Z

Weaknesses