Impact
Key detail from CVE description: a stack-based buffer overflow can be triggered by manipulating the arguments key1/key2/key3/key4/pskValue in the /goform/form2RepeaterStep2.cgi servlet of D‑Link DIR‑816 firmware 1.10CNB05. The control‑flow corruption allows an attacker to execute arbitrary code on the router, compromising confidentiality, integrity, and availability of the device and potentially the network it serves.
Affected Systems
Key detail from CVE description: only the D‑Link DIR‑816 model running firmware version 1.10CNB05 is affected. No other firmware versions or models are mentioned, and the vulnerability is stated to impact products that are no longer supported by the manufacturer.
Risk and Exploitability
The CVSS score of 9.3 indicates a critical severity level, and the EPSS score of <1% suggests low current exploit probability. The vulnerability is not listed in the KEV catalog. It is inferred that exploitation requires remote access to the router’s administrative interface over the network, targeting the form2RepeaterStep2.cgi endpoint. The public release of an exploit amplifies the risk if the device is still under network exposure.
OpenCVE Enrichment