Impact
This vulnerability is a stack-based buffer overflow triggered by the pskValue argument in the /goform/form2WlanBasicSetup.cgi file. A maliciously crafted request can cause the overflow, leading to arbitrary code execution on the router. The impact provides an attacker with full compromise of the device, enabling data exfiltration, command injection, and disruption of network services—affecting confidentiality, integrity, and availability at a critical level.
Affected Systems
Affected systems are D‑Link DIR‑816 routers running firmware version 1.10CNB05. The flaw only exists in the legacy firmware that is no longer supported by the vendor. Systems identified by the CPE strings cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:* and cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05:*:*:*:*:*:*:* are impacted.
Risk and Exploitability
The vulnerability scores 9.3 on the CVSS scale, indicating critical severity. EPSS shows a probability of exploitation of less than 1%, and the issue is not listed in the CISA KEV catalog. Despite the low odds, the flaw is publicly disclosed and can be exploited remotely via a crafted HTTP request to the vulnerable CGI, making it a non‑negligible risk for exposed devices. The likely attack vector is remote network access to the router’s web interface.
OpenCVE Enrichment