Vulnerability Description
A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-816 Firmware | 1.10cnb05 |
| Dlink | Dir-816 | - |
Related Weaknesses (CWE)
References
- https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_87/87.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.351087Permissions RequiredVDB Entry
- https://vuldb.com/?id.351087Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.769831Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2026-4183?
CVE-2026-4183 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the a...
How severe is CVE-2026-4183?
CVE-2026-4183 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-4183?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-816 Firmware, Dlink Dir-816.