{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4180","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-14T21:56:54.201Z","datePublished":"2026-03-15T13:32:10.207Z","dateUpdated":"2026-03-17T15:17:11.342Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-15T13:32:10.207Z"},"title":"D-Link DIR-816 goahead redirect.asp access control","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"D-Link","product":"DIR-816","versions":[{"version":"1.10CNB05","status":"affected"}],"modules":["goahead"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-14T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-14T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-14T23:02:14.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"pjqwudi (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.351084","name":"VDB-351084 | D-Link DIR-816 goahead redirect.asp access control","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.351084","name":"VDB-351084 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.769828","name":"Submit #769828 | D-Link DIR816 1.10CNB05 Improper Access Controls","tags":["third-party-advisory"]},{"url":"https://github.com/wudipjq/my_vuln/blob/main/D-Link7/vuln_84/84.md","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-17T15:17:01.474186Z","id":"CVE-2026-4180","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-17T15:17:11.342Z"}}]}}