Impact
The vulnerability is a stack‑based buffer overflow in the /goform/form2Wl5BasicSetup.cgi CGI script of D‑Link DIR‑816 firmware 1.10CNB05. Manipulating the pskValue parameter causes memory corruption and can allow an attacker to execute arbitrary code on the router. The weakness corresponds to CWE‑119, CWE‑121, and CWE‑787. Because a malicious packet can be sent over the network, the impact is Remote Code Execution that could compromise the device’s configuration, traffic, or function.
Affected Systems
Affected systems are D‑Link routers model DIR‑816 running firmware version 1.10CNB05. No other firmware releases are listed as affected. The vulnerability is tied to the goahead component that is no longer supported by the vendor. The relevant CPE entries are cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:* and cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05:*:*:*:*:*:*:*.
Risk and Exploitability
The CVSS base score of 9.3 classifies the defect as Critical. The EPSS score is less than 1 %, indicating low current exploitation prevalence, but the vulnerability is publicly known and can be reached from outside the local network. Since it is not listed in the CISA KEV catalog, there is no immediate patch listed by CISA, however the high severity warrants prompt action. The attack requires remote access to the router’s web administration interface and the ability to send a crafted HTTP request containing a large pskValue payload.
OpenCVE Enrichment