CVE-2026-4182

A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_86/86.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.351086 Permissions Required VDB Entry
https://vuldb.com/?id.351086 Third Party Advisory VDB Entry
https://vuldb.com/?submit.769830 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-16 14:19

Updated : 2026-03-19 19:57


NVD link : CVE-2026-4182

Mitre link : CVE-2026-4182

CVE.ORG link : CVE-2026-4182


JSON object : View

Products Affected

dlink

  • dir-816_firmware
  • dir-816
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write