CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

dlink

dir-816_firmware

70 known vulnerabilities · sorted by CVSS score

CVE-2019-10039
CRITICAL9.8

The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/setSysAdm to edit the web or system account without authentication.

dlink / dir-816_firmware
Network
Published Mar 25, 2019
Page 1 of 4
CVE-2019-10040
CRITICAL9.8

The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use a hidden API URL /goform/SystemCommand to execute a system command without authentication.

dlink / dir-816_firmware
Network
Published Mar 25, 2019
CVE-2019-10041
CRITICAL9.8

The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/form2userconfig.cgi to edit the system account without authentication.

dlink / dir-816_firmware
Network
Published Mar 25, 2019
CVE-2021-26810
CRITICAL9.8

D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser parameter.

dlink / dir-816_firmware
Network
Published Mar 30, 2021
CVE-2021-27113
CRITICAL9.8

An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters.

dlink / dir-816_firmware
Network
Published Apr 14, 2021
CVE-2021-27114
CRITICAL9.8

An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/addassignment route, a very long text entry for the"'s_ip" and "s_mac" fields could lead to a Stack-Based Buffer Overflow and overwrite the return address.

dlink / dir-816_firmware
Network
Published Apr 14, 2021
CVE-2021-39509
CRITICAL9.8

An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters.

dlink / dir-816_firmware
Network
Published Aug 24, 2021
CVE-2021-39510
CRITICAL9.8

An issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router, The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters.

dlink / dir-816_firmware
Network
Published Aug 24, 2021
CVE-2021-31326
CRITICAL9.8

D-Link DIR-816 A2 1.10 B05 allows unauthenticated attackers to arbitrarily reset the device via a crafted tokenid parameter to /goform/form2Reboot.cgi.

dlink / dir-816_firmware
Network
Published Mar 24, 2022
CVE-2022-28915
CRITICAL9.8

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a command injection vulnerability via the admuser and admpass parameters in /goform/setSysAdm.

dlink / dir-816_firmware
Network
Published May 10, 2022
CVE-2022-29321
CRITICAL9.8

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the lanip parameter in /goform/setNetworkLan.

dlink / dir-816_firmware
Network
Published May 10, 2022
CVE-2022-29322
CRITICAL9.8

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the IPADDR and nvmacaddr parameters in /goform/form2Dhcpip.

dlink / dir-816_firmware
Network
Published May 10, 2022
CVE-2022-29323
CRITICAL9.8

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the MAC parameter in /goform/editassignment.

dlink / dir-816_firmware
Network
Published May 10, 2022
CVE-2022-29324
CRITICAL9.8

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the proto parameter in /goform/form2IPQoSTcAdd.

dlink / dir-816_firmware
Network
Published May 10, 2022
CVE-2022-29325
CRITICAL9.8

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the addurlfilter parameter in /goform/websURLFilter.

dlink / dir-816_firmware
Network
Published May 10, 2022
CVE-2022-29326
CRITICAL9.8

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the addhostfilter parameter in /goform/websHostFilter.

dlink / dir-816_firmware
Network
Published May 10, 2022
CVE-2022-29327
CRITICAL9.8

D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the urladd parameter in /goform/websURLFilterAddDel.

dlink / dir-816_firmware
Network
Published May 10, 2022
CVE-2022-37134
CRITICAL9.8

D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/form2Wan.cgi. When wantype is 3, l2tp_usrname will be decrypted by base64, and the result will be stored in v94, which does not check the size of l2tp_usrname, resulting in stack overflow.

dlink / dir-816_firmware
Network
Published Aug 22, 2022
CVE-2022-37128
CRITICAL9.8

In D-Link DIR-816 A2_v1.10CNB04.img the network can be initialized without authentication via /goform/wizard_end.

dlink / dir-816_firmware
Network
Published Aug 31, 2022
CVE-2022-37125
CRITICAL9.8

D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/NTPSyncWithHost.

dlink / dir-816_firmware
Network
Published Aug 31, 2022