Critical severity9.8NVD Advisory· Published Apr 21, 2017· Updated May 13, 2026
CVE-2016-1558
CVE-2016-1558
Description
Buffer overflow in D-Link DAP-2310 2.06 and earlier, DAP-2330 1.06 and earlier, DAP-2360 2.06 and earlier, DAP-2553 H/W ver. B1 3.05 and earlier, DAP-2660 1.11 and earlier, DAP-2690 3.15 and earlier, DAP-2695 1.16 and earlier, DAP-3320 1.00 and earlier, and DAP-3662 1.01 and earlier allows remote attackers to have unspecified impact via a crafted 'dlink_uid' cookie.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.dlink.com/mk/mk/support/support-news/2016/march/16/firmadyne-cve_2016_1558-cve_2016_1559nvdPatchVendor Advisory
- packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.htmlnvdBroken LinkThird Party AdvisoryVDB Entry
- seclists.org/fulldisclosure/2016/Feb/112nvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.