
CVE-2025-5630 – D-Link DIR-816 form2lansetup.cgi stack-based overflow
https://notcve.org/view.php?id=CVE-2025-5630
05 Jun 2025 — A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. This vulnerability affects unknown code of the file /goform/form2lansetup.cgi. The manipulation of the argument ip leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_54/54.md • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVE-2025-5624 – D-Link DIR-816 QoSPortSetup stack-based overflow
https://notcve.org/view.php?id=CVE-2025-5624
05 Jun 2025 — A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been declared as critical. This vulnerability affects the function QoSPortSetup of the file /goform/QoSPortSetup. The manipulation of the argument port0_group/port0_remarker/ssid0_group/ssid0_remarker leads to stack-based buffer overflow. The attack can be initiated remotely. • https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_53/53.md • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVE-2025-5623 – D-Link DIR-816 qosClassifier stack-based overflow
https://notcve.org/view.php?id=CVE-2025-5623
05 Jun 2025 — A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to stack-based buffer overflow. It is possible to initiate the attack remotely. • https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_51/51.md • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVE-2025-5622 – D-Link DIR-816 wirelessApcli_5g stack-based overflow
https://notcve.org/view.php?id=CVE-2025-5622
05 Jun 2025 — A vulnerability was found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this issue is the function wirelessApcli_5g of the file /goform/wirelessApcli_5g. The manipulation of the argument apcli_mode_5g/apcli_enc_5g/apcli_default_key_5g leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_50/50.md • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVE-2025-5621 – D-Link DIR-816 qosClassifier os command injection
https://notcve.org/view.php?id=CVE-2025-5621
04 Jun 2025 — A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this vulnerability is the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_49/49.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2025-5620 – D-Link DIR-816 setipsec_config os command injection
https://notcve.org/view.php?id=CVE-2025-5620
04 Jun 2025 — A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_48/48.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2025-1392 – D-Link DIR-816 index.html cross site scripting
https://notcve.org/view.php?id=CVE-2025-1392
17 Feb 2025 — A vulnerability has been found in D-Link DIR-816 1.01TO and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/webproc?getpage=html/index.html&var:menu=24gwlan&var:page=24G_basic. The manipulation of the argument SSID leads to cross site scripting. The attack can be launched remotely. • https://vuldb.com/?ctiid.296023 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-13108 – D-Link DIR-816 A2 form2NetSniper.cgi access control
https://notcve.org/view.php?id=CVE-2024-13108
02 Jan 2025 — A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. It has been declared as critical. This vulnerability affects unknown code of the file /goform/form2NetSniper.cgi. The manipulation leads to improper access controls. The attack can be initiated remotely. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2NetSniper.md • CWE-266: Incorrect Privilege Assignment CWE-284: Improper Access Control •

CVE-2024-13107 – D-Link DIR-816 A2 ACL form2LocalAclEditcfg.cgi access control
https://notcve.org/view.php?id=CVE-2024-13107
02 Jan 2025 — A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. It has been classified as critical. This affects an unknown part of the file /goform/form2LocalAclEditcfg.cgi of the component ACL Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2LocalAclEditcfg.md • CWE-266: Incorrect Privilege Assignment CWE-284: Improper Access Control •

CVE-2024-13106 – D-Link DIR-816 A2 IP QoS form2IPQoSTcAdd access control
https://notcve.org/view.php?id=CVE-2024-13106
02 Jan 2025 — A vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210 and classified as critical. Affected by this issue is some unknown functionality of the file /goform/form2IPQoSTcAdd of the component IP QoS Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2IPQoSTcAdd.md • CWE-266: Incorrect Privilege Assignment CWE-284: Improper Access Control •