CVE-2026-4182
🔴 Łataj teraz
Przepełnienie bufora w D-Link DIR-816 umożliwia zdalne wykonanie kodu, co może prowadzić do przejęcia kontroli nad urządzeniem.
CVSS
9.8
EPSS
0.1%
Exploit
poc
Vendor
dlink
Opis źródłowy (NVD)
A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
buffer-overflow exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-03-16 14:19:59 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-19 19:57:16 UTC |
Referencje
- https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_86/86.md (cna@vuldb.com) [Exploit, Third Party Advisory]
- https://vuldb.com/?ctiid.351086 (cna@vuldb.com) [Permissions Required, VDB Entry]
- https://vuldb.com/?id.351086 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/?submit.769830 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://www.dlink.com/ (cna@vuldb.com) [Product]