Description
A weakness has been identified in D-Link DIR-816 1.10CNB05_R1B011D88210. Affected by this vulnerability is the function sub_445E7C of the file /goform/formDMZ.cgi. This manipulation causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-05-11
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

D-Link DIR-816 firmware 1.10CNB05_R1B011D88210 contains a command injection vulnerability in the sub_445E7C function of /goform/formDMZ.cgi. An attacker who can craft requests to the affected endpoint can inject arbitrary shell commands, which may lead to remote code execution on the device. The weakness directly impacts the confidentiality and integrity of the device, allowing the attacker to gain system-level privileges and potentially expand the attack surface to the connected network.

Affected Systems

The vulnerability is specific to the D‑Link DIR‑816 router model. Firmware revision 1.10CNB05_R1B011D88210 is affected; other firmware versions have not been confirmed as vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. No EPSS score was provided, and the vulnerability is not listed in CISA KEV. The exploit is available publicly and can be triggered remotely by sending crafted requests to the /goform/formDMZ.cgi endpoint, exploiting the command injection flaw.

Generated by OpenCVE AI on May 11, 2026 at 23:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device firmware to a version that removes the vulnerable function.
  • If an upgrade is not possible, block access to the /goform/formDMZ.cgi endpoint via firewall or router settings.
  • Continuously monitor traffic for suspicious command injection attempts.

Generated by OpenCVE AI on May 11, 2026 at 23:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dir-816
Vendors & Products D-link
D-link dir-816

Mon, 11 May 2026 22:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in D-Link DIR-816 1.10CNB05_R1B011D88210. Affected by this vulnerability is the function sub_445E7C of the file /goform/formDMZ.cgi. This manipulation causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
Title D-Link DIR-816 formDMZ.cgi sub_445E7C command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T21:30:12.914Z

Reserved: 2026-05-11T16:24:15.587Z

Link: CVE-2026-8344

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-11T22:22:14.977

Modified: 2026-05-11T22:22:14.977

Link: CVE-2026-8344

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T00:00:04Z

Weaknesses