Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4180: Improper Access Controls in D-Link DIR-816

0
Medium
VulnerabilityCVE-2026-4180cvecve-2026-4180
Published: Sun Mar 15 2026 (03/15/2026, 13:32:10 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-816

Description

CVE-2026-4180 is a medium severity vulnerability affecting the D-Link DIR-816 router running firmware version 1. 10CNB05. It involves improper access controls in the redirect. asp component, specifically through manipulation of the token_id argument. The flaw allows remote attackers to bypass access restrictions without authentication or user interaction. Although the exploit code is publicly available, the affected product is no longer supported by the vendor, and no known exploits are currently observed in the wild. The vulnerability could lead to unauthorized access or control over the device, impacting confidentiality, integrity, and availability. Organizations using this outdated router model are at risk and should consider mitigation steps. Due to the product’s market presence, countries with significant consumer or enterprise deployment of D-Link devices are more likely to be affected. Immediate mitigation involves network segmentation, disabling remote management, and replacing unsupported hardware.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:03:22 UTC

Technical Analysis

CVE-2026-4180 identifies an improper access control vulnerability in the D-Link DIR-816 router, specifically in firmware version 1.10CNB05. The vulnerability resides in an unknown function within the redirect.asp file of the goahead web server component embedded in the device. By manipulating the token_id parameter, an attacker can bypass intended access controls remotely without requiring authentication or user interaction. This allows unauthorized users to potentially access restricted functions or sensitive information on the router. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, and no privileges or user interaction needed. Although the exploit is publicly available, the product is no longer supported by D-Link, meaning no official patches or updates are forthcoming. The lack of vendor support increases risk as vulnerabilities remain unpatched. The goahead web server is commonly used in embedded devices, and the redirect.asp script likely handles HTTP redirection or session management, making improper token validation critical. The vulnerability could be leveraged to gain unauthorized control or disrupt device operation, potentially impacting network security and device availability.

Potential Impact

The improper access control vulnerability in the D-Link DIR-816 router can lead to unauthorized remote access to device functions, potentially allowing attackers to alter configurations, intercept or redirect network traffic, or disrupt device availability. This compromises the confidentiality, integrity, and availability of the affected device and any networks relying on it. Since the device is often deployed in home and small office environments, exploitation could lead to network compromise, data interception, or use of the device as a pivot point for further attacks. The lack of vendor support means no patches will be released, increasing the risk of exploitation over time. Organizations using this router model may face increased exposure to attacks, especially if remote management is enabled or the device is accessible from untrusted networks. The exploit’s public availability further raises the likelihood of opportunistic attacks. While no known exploits in the wild are reported yet, the vulnerability’s characteristics make it a credible threat to affected users.

Mitigation Recommendations

1. Immediately discontinue use of the D-Link DIR-816 router running firmware 1.10CNB05, as it is no longer supported and vulnerable. Replace it with a currently supported device that receives regular security updates. 2. If replacement is not immediately feasible, disable all remote management and administration interfaces accessible from untrusted networks to reduce exposure. 3. Segment the network to isolate the vulnerable router from critical systems and sensitive data to limit potential impact. 4. Monitor network traffic for unusual activity that may indicate exploitation attempts targeting the redirect.asp endpoint or token_id parameter. 5. Employ network-level protections such as firewalls and intrusion detection/prevention systems to block unauthorized access attempts. 6. Educate users and administrators about the risks of using unsupported hardware and the importance of timely device replacement. 7. Regularly audit network devices to identify unsupported or vulnerable equipment and prioritize their upgrade or decommissioning. 8. Consider deploying network access control (NAC) solutions to enforce device compliance and restrict vulnerable devices from critical network segments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-14T21:56:54.201Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b7c1499d4df45183375338

Added to database: 3/16/2026, 8:37:29 AM

Last enriched: 3/24/2026, 1:03:22 AM

Last updated: 4/30/2026, 5:22:52 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses