Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4180: Improper Access Controls in D-Link DIR-816

0
Medium
VulnerabilityCVE-2026-4180cvecve-2026-4180
Published: Sun Mar 15 2026 (03/15/2026, 13:32:10 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-816

Description

CVE-2026-4180 is a medium-severity vulnerability affecting the D-Link DIR-816 router, version 1. 10CNB05. It involves improper access controls in the redirect. asp file within the goahead component, specifically through manipulation of the token_id argument. The flaw allows remote attackers to bypass access restrictions without authentication or user interaction. Although an exploit is publicly available, the affected product is no longer supported by D-Link, and no patches exist. The vulnerability could lead to unauthorized access or control over the device, potentially compromising network security. Organizations using this outdated router model remain at risk, especially if devices are exposed to untrusted networks. Mitigation primarily involves device replacement or network segmentation, as no official fixes are provided. Countries with significant D-Link market presence and reliance on this model are at higher risk.

AI-Powered Analysis

AILast updated: 03/16/2026, 08:41:04 UTC

Technical Analysis

CVE-2026-4180 identifies a security vulnerability in the D-Link DIR-816 router, specifically version 1.10CNB05. The issue resides in the redirect.asp file of the goahead web server component, where improper access controls are implemented. An attacker can manipulate the token_id parameter to bypass authentication or authorization checks, gaining unauthorized access to restricted functions or data on the device. This vulnerability is remotely exploitable without requiring any privileges or user interaction, increasing its risk profile. The CVSS 4.0 base score is 6.9 (medium), reflecting network attack vector, low attack complexity, and no required authentication. Despite the availability of a public exploit, the affected product is no longer supported by D-Link, and no patches or updates have been released to remediate the flaw. The vulnerability could allow attackers to compromise the router’s configuration or potentially pivot into the internal network. The goahead component is a lightweight embedded web server commonly used in IoT and networking devices, and improper access control in such components is a frequent source of vulnerabilities. Since the product is obsolete, organizations still using it face a difficult remediation path, often requiring hardware replacement. The lack of vendor support increases the risk of exploitation in the wild, especially in environments where these routers remain exposed to the internet or untrusted networks.

Potential Impact

The vulnerability allows remote attackers to bypass access controls without authentication, potentially leading to unauthorized access to router management functions or sensitive information. This can result in compromise of the device’s configuration, interception or manipulation of network traffic, or use of the router as a foothold for further attacks within an organization’s network. Given the router’s role as a network gateway, exploitation could impact confidentiality, integrity, and availability of network communications. Although the CVSS score is medium, the lack of vendor support and patches elevates the operational risk, as affected devices cannot be securely updated. Organizations relying on this router model may face increased exposure to cyberattacks, especially if devices are internet-facing or poorly segmented. The exploitability without authentication and user interaction makes it easier for attackers to automate attacks at scale. However, the impact is somewhat limited by the product’s obsolescence and declining deployment in modern networks.

Mitigation Recommendations

Since no official patches or updates are available due to the product being out of support, the primary mitigation is to replace the affected D-Link DIR-816 routers with current, supported models that receive regular security updates. Until replacement is feasible, organizations should isolate these devices from untrusted networks by implementing strict network segmentation and firewall rules to restrict access to the router’s management interface. Disabling remote management features and restricting access to trusted IP addresses can reduce exposure. Monitoring network traffic for unusual activity targeting the router’s web interface or token_id parameter may help detect exploitation attempts. Additionally, organizations should review and update their asset inventories to identify any remaining vulnerable devices. Employing network intrusion detection systems (NIDS) with signatures for known exploits targeting this vulnerability can provide early warning. Finally, educating network administrators about the risks of using unsupported hardware and enforcing hardware lifecycle policies will prevent similar risks in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-14T21:56:54.201Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b7c1499d4df45183375338

Added to database: 3/16/2026, 8:37:29 AM

Last enriched: 3/16/2026, 8:41:04 AM

Last updated: 3/16/2026, 9:38:25 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses