D-Link Dir 816 Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in D-Link Dir 816 Firmware.
By the Year
In 2026 there have been 0 vulnerabilities in D-Link Dir 816 Firmware. Last year, in 2025 Dir 816 Firmware had 25 security vulnerabilities published. Right now, Dir 816 Firmware is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 25 | 7.24 |
| 2024 | 2 | 9.80 |
| 2023 | 0 | 0.00 |
| 2022 | 6 | 9.42 |
It may take a day or so for new Dir 816 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent D-Link Dir 816 Firmware Security Vulnerabilities
RCE in D-Link DIR-816-A2 FW 1.10CNB05 via bin/goahead system()
CVE-2025-45931
- June 30, 2025
An issue D-Link DIR-816-A2 DIR-816A2_FWv1.10CNB05_R1B011D88210 allows a remote attacker to execute arbitrary code via system() function in the bin/goahead file
Critical Stack-Based Buffer Overflow in D-Link DIR-816 1.10CNB05 (form2lansetup.cgi)
CVE-2025-5630
9.8 - Critical
- June 05, 2025
A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. This vulnerability affects unknown code of the file /goform/form2lansetup.cgi. The manipulation of the argument ip leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Memory Corruption
Critical Stack Overflow in D-Link DIR-816 1.10CNB05 QoSPortSetup
CVE-2025-5624
9.8 - Critical
- June 05, 2025
A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been declared as critical. This vulnerability affects the function QoSPortSetup of the file /goform/QoSPortSetup. The manipulation of the argument port0_group/port0_remarker/ssid0_group/ssid0_remarker leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Memory Corruption
D-Link DIR-816 1.10CNB05: Remote OS Command Injection via setipsec_config
CVE-2025-5620
9.8 - Critical
- June 05, 2025
A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Shell injection
OS Command Injection in D-Link DIR-816 1.10CNB05 QoS Classifier (Remote)
CVE-2025-5621
9.8 - Critical
- June 05, 2025
A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this vulnerability is the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Shell injection
D-Link DIR-816 1.10CNB05 VULN: wirelessApcli_5g stack overflow
CVE-2025-5622
9.8 - Critical
- June 05, 2025
A vulnerability was found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this issue is the function wirelessApcli_5g of the file /goform/wirelessApcli_5g. The manipulation of the argument apcli_mode_5g/apcli_enc_5g/apcli_default_key_5g leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Memory Corruption
DIR-816 1.10CNB05: Remote Stack-based Buffer Overflow in qosClassifier
CVE-2025-5623
9.8 - Critical
- June 05, 2025
A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Memory Corruption
DIR-816 A2V1.1.0B05 Command Injection via /goform/delRouting
CVE-2025-29743
- April 22, 2025
D-Link DIR-816 A2V1.1.0B05 was found to contain a command injection in /goform/delRouting.
D-Link DIR-816 1.01TO XSS via /cgi-bin/webproc?getpage=... SSID param
CVE-2025-1392
5.4 - Medium
- February 17, 2025
A vulnerability has been found in D-Link DIR-816 1.01TO and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/webproc?getpage=html/index.html&var:menu=24gwlan&var:page=24G_basic. The manipulation of the argument SSID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
XSS
Unauth Access Control in D-Link 816A2 websURLFilterAddDel
CVE-2024-57683
- January 16, 2025
An access control issue in the component websURLFilterAddDel of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the filter settings of the device via a crafted POST request.
D-Link 816A2 Access Control Bypass on formDMZ.cgi (v1.10CNB05)
CVE-2024-57684
- January 16, 2025
An access control issue in the component formDMZ.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the DMZ service of the device via a crafted POST request.
Unauth Access: D-Link 816A2 form2WlanBasicSetup.cgi pre-v1.10
CVE-2024-57676
- January 16, 2025
An access control issue in the component form2WlanBasicSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G wlan service of the device via a crafted POST request.
Access Control in form2Wan.cgi pre-1.10CNB05 on D-Link 816A2
CVE-2024-57677
- January 16, 2025
An access control issue in the component form2Wan.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the wan service of the device via a crafted POST request.
Unauth MAC ACL Reset via form2WlAc.cgi in D-Link 816A2 (FWv1.10)
CVE-2024-57678
- January 16, 2025
An access control issue in the component form2WlAc.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G mac access control list of the device via a crafted POST request.
Unauth Access to form2RepeaterSetup.cgi in D-Link 816A2 FWv1.10
CVE-2024-57679
- January 16, 2025
An access control issue in the component form2RepeaterSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G repeater service of the device via a crafted POST request.
D-Link 816A2: Unauth Port Trigger via form2PortriggerRule.cgi (V1.10CNB05)
CVE-2024-57680
- January 16, 2025
An access control issue in the component form2PortriggerRule.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the port trigger of the device via a crafted POST request.
Unauthenticated ACB in D-Link 816A2 form2alg.cgi (FW 1.10) via POST
CVE-2024-57681
- January 16, 2025
An access control issue in the component form2alg.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the agl service of the device via a crafted POST request.
Info Leak: d_status.asp in D-Link 816A2 firmware 1.10CNB05_R1 before 1.10
CVE-2024-57682
- January 16, 2025
An information disclosure vulnerability in the component d_status.asp of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to access sensitive information via a crafted POST request.
Critical Improper Access in D-Link DIR-816 A2 via /goform/form2NetSniper.cgi
CVE-2024-13108
5.3 - Medium
- January 02, 2025
A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. It has been declared as critical. This vulnerability affects unknown code of the file /goform/form2NetSniper.cgi. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Authorization
D-Link DIR-816 A2 1.10CNB05 ACL Improper Access Control (Critical)
CVE-2024-13107
5.3 - Medium
- January 02, 2025
A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. It has been classified as critical. This affects an unknown part of the file /goform/form2LocalAclEditcfg.cgi of the component ACL Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Authorization
D-Link DIR-816 A2 v1.10CNB05 R1B011D88210 IP QoS Improper Access exploit
CVE-2024-13106
5.3 - Medium
- January 02, 2025
A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210 and classified as critical. Affected by this issue is some unknown functionality of the file /goform/form2IPQoSTcAdd of the component IP QoS Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Authorization
D-Link DIR-816 A2 v1.10RH Improper Access DHCPD (CVE-2024-13105)
CVE-2024-13105
5.3 - Medium
- January 02, 2025
A vulnerability has been found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/form2Dhcpd.cgi of the component DHCPD Setting Handler. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Authorization
D-Link DIR-816 A2 1.10CNB05: Remote Access Flaw in /goform/form2AdvanceSetup.cgi
CVE-2024-13104
5.3 - Medium
- January 02, 2025
A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Authorization
Remote Access Control Bypass in D-Link DIR-816 A2 1.10CNB05 DDNS Service
CVE-2024-13102
5.3 - Medium
- January 02, 2025
A vulnerability classified as critical was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This vulnerability affects unknown code of the file /goform/DDNS of the component DDNS Service. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Authorization
D-Link DIR-816 1.10 Critical Improper Access Control Virtual Service Handler
CVE-2024-13103
5.3 - Medium
- January 02, 2025
A vulnerability, which was classified as critical, has been found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This issue affects some unknown processing of the file /goform/form2AddVrtsrv.cgi of the component Virtual Service Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Authorization
Command Injection in D-Link DIR-816 v1.10CNB04 via urlAdd
CVE-2023-24331
- February 21, 2024
Command Injection vulnerability in D-Link Dir 816 with firmware version DIR-816_A2_v1.10CNB04 allows attackers to run arbitrary commands via the urlAdd parameter.
D-Link DIR-816A2 Remote Code Exec via wizardstep4_ssid_2 (v1.10CNB05)
CVE-2024-24321
9.8 - Critical
- February 08, 2024
An issue in Dlink DIR-816A2 v.1.10CNB05 allows a remote attacker to execute arbitrary code via the wizardstep4_ssid_2 parameter in the sub_42DA54 function.
Command Injection
Stack Overflow in D-Link DIR-816 A2 1.10 B05 via srcip param
CVE-2022-42998
9.8 - Critical
- October 26, 2022
D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the srcip parameter at /goform/form2IPQoSTcAdd.
Memory Corruption
Multiple Command Injection via /goform/setSysAdm in D-Link DIR-816 A2 1.10 B05
CVE-2022-42999
7.5 - High
- October 26, 2022
D-Link DIR-816 A2 1.10 B05 was discovered to contain multiple command injection vulnerabilities via the admuser and admpass parameters at /goform/setSysAdm.
Shell injection
D-Link DIR-816 A2 1.10 B05 Stack Overflow via wizardstep4_pskpwd
CVE-2022-43000
9.8 - Critical
- October 26, 2022
D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the wizardstep4_pskpwd parameter at /goform/form2WizardStep4.
Memory Corruption
Stack Overflow in D-Link DIR-816 A2 via pskValue (setSecurity)
CVE-2022-43001
9.8 - Critical
- October 26, 2022
D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the pskValue parameter in the setSecurity function.
Memory Corruption
D-Link DIR-816 A2 1.10 B05 - Stack Overflow via wizardstep54_pskpwd
CVE-2022-43002
9.8 - Critical
- October 26, 2022
D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the wizardstep54_pskpwd parameter at /goform/form2WizardStep54.
Memory Corruption
Stack overflow in DIR-816 A2 1.10 B05 setRepeaterSecurity (D-Link)
CVE-2022-43003
9.8 - Critical
- October 26, 2022
D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the pskValue parameter in the setRepeaterSecurity function.
Memory Corruption
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for D-Link Dir 816 Firmware or by D-Link? Click the Watch button to subscribe.