Vulnerabilities
Vulnerable Software
Dlink:  >> Dir-816  >> a2  Security Vulnerabilities
D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser parameter.
CVSS Score
9.8
EPSS Score
0.343
Published
2021-03-30
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/setSysAdm to edit the web or system account without authentication.
CVSS Score
9.8
EPSS Score
0.012
Published
2019-03-25
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use a hidden API URL /goform/SystemCommand to execute a system command without authentication.
CVSS Score
9.8
EPSS Score
0.013
Published
2019-03-25
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/form2userconfig.cgi to edit the system account without authentication.
CVSS Score
9.8
EPSS Score
0.009
Published
2019-03-25
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/LoadDefaultSettings to reset the router without authentication.
CVSS Score
7.5
EPSS Score
0.008
Published
2019-03-25


Contact Us

Shodan ® - All rights reserved