Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown

CVE-2024-24321

Disclosure Date: February 08, 2024 (last updated February 15, 2024)
An issue in Dlink DIR-816A2 v.1.10CNB05 allows a remote attacker to execute arbitrary code via the wizardstep4_ssid_2 parameter in the sub_42DA54 function.
Attacker Value
Unknown

CVE-2023-43240

Disclosure Date: September 21, 2023 (last updated October 08, 2023)
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter sip_address in ipportFilter.
Attacker Value
Unknown

CVE-2023-43239

Disclosure Date: September 21, 2023 (last updated October 08, 2023)
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter flag_5G in showMACfilterMAC.
Attacker Value
Unknown

CVE-2023-43238

Disclosure Date: September 21, 2023 (last updated October 08, 2023)
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter nvmacaddr in form2Dhcpip.cgi.
Attacker Value
Unknown

CVE-2023-43237

Disclosure Date: September 21, 2023 (last updated October 08, 2023)
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter macCloneMac in setMAC.
Attacker Value
Unknown

CVE-2023-43236

Disclosure Date: September 21, 2023 (last updated October 08, 2023)
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter statuscheckpppoeuser in dir_setWanWifi.
Attacker Value
Unknown

CVE-2021-31326

Disclosure Date: March 24, 2022 (last updated October 07, 2023)
D-Link DIR-816 A2 1.10 B05 allows unauthenticated attackers to arbitrarily reset the device via a crafted tokenid parameter to /goform/form2Reboot.cgi.
Attacker Value
Unknown

CVE-2021-39509

Disclosure Date: August 24, 2021 (last updated February 23, 2025)
An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters.