


Perceptive Security
SOC/SIEM Consultancy

A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi …
Published:
15 maart 2026 om 23:00:00
Alert date:
16 maart 2026 om 16:21:26
Source:
nvd.nist.gov
Network Infrastructure, Mobile & IoT
A stack-based buffer overflow vulnerability (CVE-2026-4184) was discovered in D-Link DIR-816 router firmware version 1.10CNB05. The vulnerability affects the /goform/form2Wl5BasicSetup.cgi file in the goahead component, specifically when manipulating the pskValue argument. This vulnerability can be exploited remotely and public exploits are now available. The affected D-Link DIR-816 products are no longer supported by the manufacturer, making this vulnerability particularly concerning for users still running these devices.
Technical details
Mitigation steps:
Affected products:
D-Link DIR-816
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-4184
https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_88/88.md
https://vuldb.com/?ctiid.351088
https://vuldb.com/?id.351088
https://vuldb.com/?submit.769832
https://www.dlink.com/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
