CVE-2026-4183 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 16, 2026
D-Link DIR-816 - Buffer Overflow
Overview
D-Link DIR-816 1.10CNB05 contains a stack-based buffer overflow caused by manipulation of the "pskValue" argument in /goform/form2WlanBasicSetup.cgi, letting remote attackers execute code, exploit requires crafted request.
Severity & Score
Impact
Remote attackers can execute arbitrary code, potentially leading to full system compromise.
Mitigation
Update to the latest available version or replace unsupported product.
References
Social Media Activity(1 post)
š“ CVE-2026-4183 - Critical (9.8) A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer ov... š https://www.thehackerwire.com/vulnerability/CVE-2026-4183/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-4183
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- buffer_overflow
- Status
- unconfirmed
- EPSS
- 6.1%
- Social Posts
- 1
CWE
- CWE-119
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H