[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-26307":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":85},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":82,"name":83,"published":84,"updated":27},26307,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},3,"OpenVAS",{"id":18,"codename":27,"description":27,"severity":27,"risk_description":28,"public_description":29,"public_recommendation":30,"recommendation":27,"references":31,"cvssv3":27,"epss_score":45,"epss_percentile":46,"cve":47,"in_cisa_catalog":80,"date":81,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"The following flaws exist: - CVE-2023-24331: Command injection - CVE-2023-39637: Command injection vulnerability via the component /goform/Diagnosis - CVE-2023-43236, CVE-2023-43237, CVE-2023-43238, CVE-2023-43239, CVE-2023-43240: Multiple stack overflow vulnerabilities - CVE-2024-13102: Improper access control in /goform/DDNS - CVE-2024-13103: Improper access control in the /goform/form2AddVrtsrv.cgi file of the component Virtual Service Handler - CVE-2024-13104: Improper access control in the /goform/form2AdvanceSetup.cgi file of the component WiFi Settings Handler - CVE-2024-13105: Improper access control in the /goform/form2Dhcpd.cgi file of the component DHCPD Setting Handler - CVE-2024-13106: Improper access control in the /goform/form2IPQoSTcAdd file of the component IP QoS Handler - CVE-2024-13107: Improper access control in the /goform/form2LocalAclEditcfg.cgi file of the component ACL Handler - CVE-2024-13108: Improper access control in the /goform/form2NetSniper.cgi file - CVE-2024-57676, CVE-2024-57677, CVE-2024-57678, CVE-2024-57679, CVE-2024-57680, CVE-2024-57681, CVE-2024-57682, CVE-2024-57683, CVE-2024-57684: Access control issues in various components - CVE-2025-5620, CVE-2025-5621: OS command injection - CVE-2025-5622, CVE-2025-5623, CVE-2025-5624, CVE-2025-5630: Stack-based buffer overflow - CVE-2025-44835: Command injection in iptablesWebsFilterRun - CVE-2025-60679: A stack buffer overflow vulnerability exists in the upload.cgi module, which handles firmware version information. - CVE-2025-61577: Stack overflow via the statuscheckpppoeuser parameter in the dir_setWanWifi function.","D-Link DIR-816 devices are prone to multiple vulnerabilities.","No solution was made available by the vendor. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one. Note: Vendor states that DIR-816 reached its End-of-Support Date in 30.04.2023, it is no longer supported, and firmware development has ceased. See vendor advisory for further recommendations.",[32,33,34,35,36,37,38,39,40,41,42,43,44],"https://github.com/caoyebo/CVE/tree/main/Dlink%20816%20-%20CVE-2023-24331","https://github.com/peris-navince/founded-0-days/tree/main/Dlink/816","https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_48/48.md","https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_49/49.md","https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_50/50.md","https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_51/51.md","https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_53/53.md","https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_54/54.md","https://github.com/yifan20020708/SGTaint-0-day/blob/main/DLink/DLink-DIR-816/CVE-2025-60679.md","https://service.dlink.co.in/resources/EOL-Products-Without-Service.pdf","https://legacy.us.dlink.com/","https://github.com/Flechao1/iot-vuln/blob/main/dlink-816-b05.md","https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/dir_setWanWifi/1.md",0.60641,0.98276,[48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79],"CVE-2023-24331","CVE-2023-39637","CVE-2023-43236","CVE-2023-43237","CVE-2023-43238","CVE-2023-43239","CVE-2023-43240","CVE-2024-13102","CVE-2024-13103","CVE-2024-13104","CVE-2024-13105","CVE-2024-13106","CVE-2024-13107","CVE-2024-13108","CVE-2024-57676","CVE-2024-57677","CVE-2024-57678","CVE-2024-57679","CVE-2024-57680","CVE-2024-57681","CVE-2024-57682","CVE-2024-57683","CVE-2024-57684","CVE-2025-5620","CVE-2025-5621","CVE-2025-5622","CVE-2025-5623","CVE-2025-5624","CVE-2025-5630","CVE-2025-44835","CVE-2025-60679","CVE-2025-61577",false,"2024-02-21T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.171142","D-Link DIR-816 Devices Multiple Vulnerabilities (2023 - 2025)","2025-02-05T00:00:00Z",["Island",86],{"key":87,"params":88,"result":90},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":89},"{\"text-color\":\"gray\"}",{"head":91},{}]