Description
A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-03-15
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is a stack-based buffer overflow triggered by the pskValue argument in the /goform/form2WlanBasicSetup.cgi file. A maliciously crafted request can cause the overflow, leading to arbitrary code execution on the router. The impact provides an attacker with full compromise of the device, enabling data exfiltration, command injection, and disruption of network services—affecting confidentiality, integrity, and availability at a critical level.

Affected Systems

Affected systems are D‑Link DIR‑816 routers running firmware version 1.10CNB05. The flaw only exists in the legacy firmware that is no longer supported by the vendor. Systems identified by the CPE strings cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:* and cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05:*:*:*:*:*:*:* are impacted.

Risk and Exploitability

The vulnerability scores 9.3 on the CVSS scale, indicating critical severity. EPSS shows a probability of exploitation of less than 1%, and the issue is not listed in the CISA KEV catalog. Despite the low odds, the flaw is publicly disclosed and can be exploited remotely via a crafted HTTP request to the vulnerable CGI, making it a non‑negligible risk for exposed devices. The likely attack vector is remote network access to the router’s web interface.

Generated by OpenCVE AI on March 19, 2026 at 21:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the DIR‑816 firmware to the latest supported version or apply the vendor’s patch if available.
  • If no update is possible, disable remote management or restrict access to the router only from trusted IP addresses.
  • Block or limit access to the /goform/form2WlanBasicSetup.cgi endpoint using firewall rules.
  • Monitor router logs for unusual authentication or configuration attempts.

Generated by OpenCVE AI on March 19, 2026 at 21:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-816
Dlink dir-816 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-816
Dlink dir-816 Firmware

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-816
Vendors & Products D-link
D-link dir-816

Sun, 15 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DIR-816 goahead form2WlanBasicSetup.cgi stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dir-816
Dlink Dir-816 Dir-816 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T14:40:34.375Z

Reserved: 2026-03-14T21:57:05.375Z

Link: CVE-2026-4183

cve-icon Vulnrichment

Updated: 2026-03-16T14:36:40.759Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:59.250

Modified: 2026-03-19T19:56:48.130

Link: CVE-2026-4183

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:37Z

Weaknesses