CVE-2026-8346
Received Received - Intake
Command Injection in D-Link DIR-816 Router

Publication date: 2026-05-12

Last updated on: 2026-05-12

Assigner: VulDB

Description
A vulnerability was detected in D-Link DIR-816 1.10CNB05_R1B011D88210. This affects the function portForward. Performing a manipulation of the argument ip_address results in command injection. The attack can be initiated remotely. The exploit is now public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-12
Last Modified
2026-05-12
Generated
2026-05-12
AI Q&A
2026-05-12
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
d-link dir-816 1.10cnb05_r1b011d88210
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-8346 is a stored command injection vulnerability found in the D-Link DIR-816A2 router firmware version 1.10CNB05_R1B011D88210. It affects the port forwarding function, specifically the handling of the ip_address parameter.

The vulnerability arises because the ip_address input is only lightly validated to check if it looks like an IP address, but it does not filter out dangerous command characters. This input is then stored in the router's configuration (NVRAM) without proper cleaning.

Later, when the router applies firewall rules, it reads this stored ip_address and uses it directly in a system command to configure iptables. Because the input was not sanitized, an attacker can inject arbitrary shell commands through the ip_address field.

This allows an authenticated attacker to execute commands on the router with root privileges remotely by manipulating the port forwarding ip_address parameter.


How can this vulnerability impact me? :

This vulnerability can have serious impacts because it allows an attacker with authentication to execute arbitrary commands on the router with root privileges.

  • Remote command execution can lead to full control over the router.
  • Attackers can modify network configurations, intercept or redirect traffic, or create persistent backdoors.
  • It can compromise the security and privacy of all devices connected to the affected network.
  • The exploit is publicly available, increasing the risk of widespread attacks.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the D-Link DIR-816 router firmware version 1.10CNB05_R1B011D88210 is running and if the port forwarding functionality is accessible. Specifically, the vulnerability exists in the `goform/portForward` handler where the `ip_address` parameter is processed without proper sanitization.

To detect exploitation attempts or test for the vulnerability, you can try sending crafted HTTP POST requests to the router's `goform/portForward` endpoint with malicious payloads in the `ip_address` parameter to see if command injection is possible.

Example commands to test or detect the vulnerability might include using curl to send a payload that attempts to inject shell commands:

  • curl -X POST http://<router-ip>/goform/portForward -d "ip_address=8.8.8.8;id"
  • curl -X POST http://<router-ip>/goform/portForward -d "ip_address=8.8.8.8;cat /etc/passwd"

Monitoring the router's firewall rules or NVRAM configuration for unexpected or suspicious entries in the port forwarding rules may also help detect exploitation.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the router's management interface to trusted users only, preferably limiting it to local network access and disabling remote management if enabled.

Avoid using or configuring port forwarding rules that accept untrusted input for the IP address field until a firmware update or patch is applied.

Check for and apply any available firmware updates from D-Link that address this vulnerability.

If possible, reset the router to factory defaults to clear any maliciously injected port forwarding rules.

Monitor network traffic and router logs for signs of exploitation attempts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart