Command Injection Vulnerability in D-Link DIR-816 Router
CVE-2026-8344
Key Information:
Badges
What is CVE-2026-8344?
A command injection vulnerability has been discovered in the D-Link DIR-816 router, specifically within the sub_445E7C function of the /goform/formDMZ.cgi file. This weakness allows an attacker to manipulate commands remotely, making it possible to execute arbitrary code. The exploit has been publicly disclosed, which heightens the risk of potential attacks. It is crucial for users to apply patches and follow best security practices to safeguard their devices.
Affected Version(s)
DIR-816 1.10CNB05_R1B011D88210
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved