📦 Dir 816 Firmware
by Dlink
🔍 What is Dir 816 Firmware?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This critical vulnerability in D-Link DIR-816-A2 routers allows remote attackers to execute arbitrary code via the system() function in the goahead binary. Attackers can gain complete control of affec...
This critical vulnerability in D-Link DIR-816 routers allows remote attackers to execute arbitrary code via a stack-based buffer overflow in the web interface's form2lansetup.cgi endpoint. Attackers c...
This critical vulnerability in D-Link DIR-816 routers allows remote attackers to execute arbitrary code via a stack-based buffer overflow in the QoS configuration function. Attackers can exploit this ...
This critical vulnerability in D-Link DIR-816 routers allows remote attackers to execute arbitrary code via a stack-based buffer overflow in the wireless configuration function. Attackers can exploit ...
This vulnerability allows unauthenticated attackers to remotely configure the DMZ (Demilitarized Zone) service on affected D-Link routers via a crafted POST request to formDMZ.cgi. Attackers can redir...
This CVE describes a command injection vulnerability in D-Link DIR-816 routers that allows attackers to execute arbitrary commands via the urlAdd parameter. Attackers can gain full control of affected...
This vulnerability allows remote attackers to execute arbitrary code on D-Link DIR-816A2 routers via a command injection flaw in the wizardstep4_ssid_2 parameter. Attackers can gain full control of af...
This vulnerability allows remote attackers to execute arbitrary commands on D-Link DIR-816 A2 routers via the /goform/Diagnosis component. Attackers can gain full control of affected devices, potentia...
This CVE describes a command injection vulnerability in D-Link DIR-816 routers that allows attackers to execute arbitrary commands on the device. Attackers can exploit this by injecting malicious comm...
This vulnerability allows remote attackers to execute arbitrary code on D-Link DIR-816 routers via a stack overflow in the DHCP configuration handler. Attackers can exploit this by sending specially c...
This vulnerability allows remote attackers to execute arbitrary code on D-Link DIR-816 routers via a stack overflow in the web interface. Attackers can exploit this without authentication to gain full...
This vulnerability allows remote attackers to execute arbitrary code on D-Link DIR-816 routers via a stack overflow in the addhostfilter parameter. Attackers can exploit this without authentication to...
This vulnerability allows unauthenticated attackers to remotely reset D-Link DIR-816 A2 routers to factory defaults via a crafted HTTP request. Attackers can exploit this by sending a specially crafte...
This vulnerability allows remote attackers to execute arbitrary commands on D-Link DIR-816 routers through command injection in the web interface. Attackers can exploit this by sending specially craft...
This vulnerability allows remote attackers to execute arbitrary commands on D-Link DIR-816 A2 routers by injecting shell metacharacters into HTTP parameters. Attackers can gain full control of affecte...
CVE-2021-26810 is a remote command injection vulnerability in D-Link DIR-816 A2 routers that allows attackers to execute arbitrary commands on the device. The vulnerability exists in the web interface...
A stack overflow vulnerability in D-Link DIR-816A2 routers allows attackers to cause Denial of Service (DoS) by sending crafted input to the statuscheckpppoeuser parameter. This affects users of DIR-8...
This critical vulnerability in D-Link DIR-816 routers allows remote attackers to execute arbitrary operating system commands via command injection in the qosClassifier function. Attackers can exploit ...
This vulnerability allows unauthenticated attackers to modify WAN service settings on D-Link DIR-816 routers via a crafted POST request to form2Wan.cgi. It affects D-Link DIR-816A2 routers running vul...
This vulnerability allows unauthenticated attackers to remotely configure the 2.4G and 5G repeater services on affected D-Link routers. Attackers can change wireless network settings without authentic...
An access control vulnerability in D-Link DIR-816 routers allows unauthenticated attackers to modify the agl service configuration via crafted POST requests to form2alg.cgi. This affects D-Link DIR-81...
This vulnerability allows unauthenticated attackers to modify URL filter settings on affected D-Link DIR-816A2 routers via a crafted POST request. Attackers can bypass authentication requirements to c...
This vulnerability in D-Link DIR-816 routers allows unauthorized access to the IP QoS configuration handler due to improper access controls. Attackers can remotely exploit this to modify Quality of Se...
This vulnerability allows remote attackers to bypass authentication and access WiFi settings on affected D-Link DIR-816 A2 routers. Attackers can modify wireless network configurations without proper ...