CVE-2026-4182 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 16, 2026
D-Link DIR-816 - Buffer Overflow
Overview
D-Link DIR-816 1.10CNB05 contains a stack-based buffer overflow caused by manipulation of key1/key2/key3/key4/pskValue arguments in /goform/form2Wl5RepeaterStep2.cgi, letting remote attackers execute code, exploit requires crafted request.
Severity & Score
Impact
Remote attackers can execute arbitrary code, potentially leading to full system compromise.
Mitigation
Update to the latest available version or replace unsupported product.
References
Social Media Activity(2 posts)
🚨 CRITICAL: CVE-2026-4182 in D-Link DIR-816 (v1.10CNB05) — stack buffer overflow in /goform/form2Wl5RepeaterStep2.cgi enables remote code execution. No patch, public exploit exists. Replace or isolate devices now! https://radar.offseq.com/threat/cve-2026-4182-stack-based-buffer-overflow-in-d-lin-4b5e9537 #OffSeq #DLink #IoTSecurity
View original post🚨 CRITICAL: CVE-2026-4182 in D-Link DIR-816 (v1.10CNB05) — stack buffer overflow in /goform/form2Wl5RepeaterStep2.cgi enables remote code execution. No patch, public exploit exists. Replace or isolate devices now! https://radar.offseq.com/threat/cve-2026-4182-stack-based-buffer-overflow-in-d-lin-4b5e9537 #OffSeq #DLink #IoTSecurity
View original postRelated Resources
Details
- CVE ID
- CVE-2026-4182
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- buffer_overflow
- Status
- unconfirmed
- EPSS
- 6.1%
- Social Posts
- 2
CWE
- CWE-119
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H