CVE-2026-4183

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_87/87.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.351087 Permissions Required VDB Entry
https://vuldb.com/?id.351087 Third Party Advisory VDB Entry
https://vuldb.com/?submit.769831 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:*

History

19 Mar 2026, 19:56

Type Values Removed Values Added
References () https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_87/87.md - () https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_87/87.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.351087 - () https://vuldb.com/?ctiid.351087 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.351087 - () https://vuldb.com/?id.351087 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.769831 - () https://vuldb.com/?submit.769831 - Third Party Advisory, VDB Entry
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product
First Time Dlink dir-816 Firmware
Dlink dir-816
Dlink
CPE cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:*
CWE CWE-787
Summary
  • (es) Una vulnerabilidad de seguridad ha sido detectada en D-Link DIR-816 1.10CNB05. Afectada es una función desconocida del archivo /goform/form2WlanBasicSetup.cgi del componente goahead. Tal manipulación del argumento pskValue conduce a desbordamiento de búfer basado en pila. El ataque puede ser ejecutado remotamente. El exploit ha sido divulgado públicamente y puede ser usado. Esta vulnerabilidad solo afecta productos que ya no son soportados por el mantenedor.

16 Mar 2026, 14:19

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-16 14:19

Updated : 2026-03-19 19:56


NVD link : CVE-2026-4183

Mitre link : CVE-2026-4183

CVE.ORG link : CVE-2026-4183


JSON object : View

Products Affected

dlink

  • dir-816
  • dir-816_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write