Impact
D-Link DIR-816 firmware 1.10CNB05_R1B011D88210 contains a command injection vulnerability in the sub_445E7C function of /goform/formDMZ.cgi. An attacker who can craft requests to the affected endpoint can inject arbitrary shell commands, which may lead to remote code execution on the device. The weakness directly impacts the confidentiality and integrity of the device, allowing the attacker to gain system-level privileges and potentially expand the attack surface to the connected network.
Affected Systems
The vulnerability is specific to the D‑Link DIR‑816 router model. Firmware revision 1.10CNB05_R1B011D88210 is affected; other firmware versions have not been confirmed as vulnerable.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity. No EPSS score was provided, and the vulnerability is not listed in CISA KEV. The exploit is available publicly and can be triggered remotely by sending crafted requests to the /goform/formDMZ.cgi endpoint, exploiting the command injection flaw.
OpenCVE Enrichment