D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/SystemCommand. After the user passes in the command parameter, it will be spliced into byte_4836B0 by snprintf, and finally doSystem(&byte_4836B0); will be executed, resulting in a command injection.
- https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/SystemCommand/readme.md
- https://www.dlink.com/en/security-bulletin/
- https://github.com/ARPSyndicate/cvemon
- https://github.com/z1r00/IOT_Vul