An issue D-Link DIR-816-A2 DIR-816A2_FWv1.10CNB05_R1B011D88210 allows a remote attacker to execute arbitrary code via system() function in the bin/goahead file
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
http://d-link.com | product |
https://www.dlink.com/en/security-bulletin/ | vendor advisory |
http://dir-816-a2.com | broken link |
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md | third party advisory exploit |