CVE-2026-4182 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 16, 2026
D-Link DIR-816 - Buffer Overflow
Overview
D-Link DIR-816 1.10CNB05 contains a stack-based buffer overflow caused by manipulation of the arguments key1/key2/key3/key4/pskValue in /goform/form2Wl5RepeaterStep2.cgi, letting remote attackers execute code, exploit requires crafted request.
Severity & Score
Impact
Remote attackers can execute arbitrary code, potentially leading to full system compromise.
Mitigation
Update to the latest available version or replace unsupported product.
References
Social Media Activity(1 post)
š“ CVE-2026-4182 - Critical (9.8) A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based ... š https://www.thehackerwire.com/vulnerability/CVE-2026-4182/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-4182
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- buffer_overflow
- Status
- unconfirmed
- EPSS
- 6.1%
- Social Posts
- 1
CWE
- CWE-119
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H