Description
A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-03-15
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the D‑Link DIR‑816 1.10CNB05 firmware in the file /goform/form2Wl5RepeaterStep2.cgi of the goahead component. Manipulation of the arguments key1, key2, key3, key4, and pskValue can overflow a stack buffer, providing an attacker with the potential to inject and execute arbitrary code. The vulnerability is reported as exploitable remotely, meaning an attacker can trigger the overflow over the network without local access. The primary impact is the compromise of confidentiality, integrity, and availability of the affected device, potentially allowing full remote takeover of the router.

Affected Systems

The vulnerable product is D‑Link DIR‑816 running firmware version 1.10CNB05. No other versions or products are listed in the CNA data. The vulnerability is limited to revisions that are no longer supported by the maintainer.

Risk and Exploitability

The CVSS score is 9.3, indicating critical severity. Although the EPSS score is less than 1%, indicating low probability of exploitation in the general population, the vulnerability is publicly available and could be used in targeted attacks. It is not listed in the CISA KEV catalog. The likely attack vector is remote network access via the router’s web interface to the vulnerable CGI endpoint.

Generated by OpenCVE AI on March 19, 2026 at 21:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to a version that removes the vulnerable code
  • Disable remote web administration or block external access to /goform/form2Wl5RepeaterStep2.cgi
  • Configure firewall rules to restrict access to the vulnerable URL to trusted internal IP ranges only
  • Monitor router logs for suspicious activity targeting the vulnerable endpoint
  • Contact D‑Link support for guidance if an update is not immediately available

Generated by OpenCVE AI on March 19, 2026 at 21:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-816
Dlink dir-816 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-816
Dlink dir-816 Firmware

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-816
Vendors & Products D-link
D-link dir-816

Sun, 15 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-816 goahead form2Wl5RepeaterStep2.cgi stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-816
Dlink Dir-816 Dir-816 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T14:40:34.130Z

Reserved: 2026-03-14T21:57:02.231Z

Link: CVE-2026-4182

cve-icon Vulnrichment

Updated: 2026-03-16T14:36:38.646Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:59.017

Modified: 2026-03-19T19:57:16.557

Link: CVE-2026-4182

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:38Z

Weaknesses