Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink dir-816 Dlink dir-816 Firmware |
|
| CPEs | cpe:2.3:h:dlink:dir-816:a2:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-816_firmware:1.10cnb05_r1b011d88210:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink dir-816 Dlink dir-816 Firmware |
Tue, 12 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link dir-816 |
|
| Vendors & Products |
D-link
D-link dir-816 |
Mon, 11 May 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in D-Link DIR-816 1.10CNB05_R1B011D88210. This affects the function portForward. Performing a manipulation of the argument ip_address results in command injection. The attack can be initiated remotely. The exploit is now public and may be used. | |
| Title | D-Link DIR-816 portForward command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-12T13:18:35.014Z
Reserved: 2026-05-11T16:24:24.012Z
Link: CVE-2026-8346
Updated: 2026-05-12T13:18:31.681Z
Status : Analyzed
Published: 2026-05-12T00:17:03.433
Modified: 2026-05-12T19:55:06.467
Link: CVE-2026-8346
No data.
OpenCVE Enrichment
Updated: 2026-05-12T01:30:04Z