📦 G416 Firmware
by Dlink
🔍 What is G416 Firmware?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows network-adjacent attackers to execute arbitrary commands as root on D-Link G416 wireless routers without authentication. Attackers can exploit the HTTP service on port 80 by ...
This vulnerability allows network-adjacent attackers to execute arbitrary commands as root on D-Link G416 routers without authentication. Attackers can exploit improper input validation in the HTTP se...
This vulnerability allows network-adjacent attackers to execute arbitrary commands as root on D-Link G416 routers without authentication. The flaw exists in the HTTP service on port 80 where user inpu...
This vulnerability allows attackers on the same network to execute arbitrary code as root on D-Link G416 routers without authentication. The flaw exists in the HTTP service's timestamp processing, whe...
This vulnerability allows network-adjacent attackers to execute arbitrary commands as root on D-Link G416 routers without authentication. Attackers can exploit improper input validation in the HTTP se...
This vulnerability allows attackers on the same network to execute arbitrary code as root on D-Link G416 wireless routers without authentication. The flaw exists in the HTTP service on port 80 where u...
This vulnerability allows attackers on the same network to execute arbitrary commands with root privileges on D-Link G416 routers without authentication. The flaw exists in the HTTP service on port 80...
This vulnerability allows attackers on the same network to execute arbitrary commands as root on D-Link G416 routers without authentication. The flaw exists in the HTTP service on port 80 where user i...
This vulnerability allows attackers on the same network to execute arbitrary commands as root on D-Link G416 routers without authentication. The flaw exists in the HTTP service on port 80 where user i...
This vulnerability allows attackers on the same network to execute arbitrary commands as root on D-Link G416 routers without authentication. The flaw exists in the HTTP service on port 80 where user i...
This vulnerability allows network-adjacent attackers to bypass authentication on D-Link G416 routers and execute critical functions without credentials. Attackers can potentially gain remote code exec...
This vulnerability allows network-adjacent attackers to execute arbitrary code as root on D-Link G416 routers without authentication. Attackers can exploit improper input validation in the HTTP servic...