Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4184: Stack-based Buffer Overflow in D-Link DIR-816

0
Critical
VulnerabilityCVE-2026-4184cvecve-2026-4184
Published: Sun Mar 15 2026 (03/15/2026, 17:32:09 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-816

Description

CVE-2026-4184 is a critical stack-based buffer overflow vulnerability in the D-Link DIR-816 router firmware version 1. 10CNB05. The flaw exists in the /goform/form2Wl5BasicSetup. cgi endpoint within the goahead component, where manipulation of the pskValue parameter can trigger the overflow. This vulnerability is remotely exploitable without authentication or user interaction, allowing attackers to execute arbitrary code with high impact on confidentiality, integrity, and availability. Although the affected product is no longer supported by D-Link, public exploits are available, increasing the risk of exploitation. No official patches exist, and the vulnerability affects only this specific firmware version. Organizations using this router model remain at risk, especially in environments where these devices are still deployed. Immediate mitigation involves device replacement or network segmentation to isolate vulnerable routers. Countries with significant D-Link DIR-816 deployments and critical infrastructure relying on these devices are at higher risk.

AI-Powered Analysis

AILast updated: 03/15/2026, 18:05:16 UTC

Technical Analysis

CVE-2026-4184 identifies a stack-based buffer overflow vulnerability in the D-Link DIR-816 router firmware version 1.10CNB05. The vulnerability resides in the goahead web server component, specifically in the /goform/form2Wl5BasicSetup.cgi CGI script. An attacker can remotely manipulate the pskValue parameter, which is likely related to the wireless pre-shared key configuration, to overflow a stack buffer. This overflow can corrupt memory, potentially allowing arbitrary code execution on the device without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 9.3, indicating critical severity due to its network attack vector, low complexity, and no privileges or user interaction needed. The vulnerability affects only an unsupported firmware version, meaning no official patches are available from D-Link. Public exploit code has been released, increasing the likelihood of exploitation. The compromised router could be used to intercept network traffic, launch further attacks within the network, or be conscripted into botnets. The lack of vendor support complicates remediation, forcing reliance on device replacement or network-level mitigations.

Potential Impact

The impact of CVE-2026-4184 is severe for organizations still using the affected D-Link DIR-816 firmware. Successful exploitation can lead to full compromise of the router, allowing attackers to execute arbitrary code remotely. This can result in interception or manipulation of network traffic, disruption of network availability, and pivoting to internal systems. Confidentiality is at risk due to potential data interception, integrity can be compromised by altering router configurations or traffic, and availability may be affected by denial-of-service conditions or device takeover. The exploitability without authentication or user interaction increases the threat surface significantly. Organizations relying on these routers for critical network functions or in sensitive environments face heightened risks. The absence of patches and vendor support means the vulnerability will persist, potentially exposing networks to long-term compromise if mitigations are not applied.

Mitigation Recommendations

Given the lack of official patches for this unsupported firmware, the primary mitigation is to replace affected D-Link DIR-816 devices with updated, supported hardware. If immediate replacement is not feasible, organizations should isolate these routers from critical network segments using VLANs or firewall rules to restrict access to the management interface, especially blocking external access to the /goform/form2Wl5BasicSetup.cgi endpoint. Network intrusion detection systems (NIDS) should be configured to monitor for exploit attempts targeting this CGI script or unusual traffic patterns. Disabling remote management features and changing default credentials can reduce exposure. Regular network traffic analysis and device behavior monitoring can help detect exploitation attempts early. Organizations should also review their asset inventories to identify any remaining vulnerable devices and prioritize their remediation. Finally, educating network administrators about this vulnerability and its risks is essential to ensure timely action.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-14T21:57:08.435Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b6f1829d4df45183499980

Added to database: 3/15/2026, 5:50:58 PM

Last enriched: 3/15/2026, 6:05:16 PM

Last updated: 3/15/2026, 9:39:08 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses