CVE-2026-4183

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_87/87.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.351087 Permissions Required VDB Entry
https://vuldb.com/?id.351087 Third Party Advisory VDB Entry
https://vuldb.com/?submit.769831 Third Party Advisory VDB Entry
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-16 14:19

Updated : 2026-03-19 19:56


NVD link : CVE-2026-4183

Mitre link : CVE-2026-4183

CVE.ORG link : CVE-2026-4183


JSON object : View

Products Affected

dlink

  • dir-816_firmware
  • dir-816
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write