PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-10184 Dlink CVE debrief

CVE-2016-10184 is a high-severity path traversal issue in the D-Link DWR-932B router. According to NVD, the qmiweb component allows file reading using ..%2f traversal, which can expose local files over the network. NVD classifies the weakness as CWE-22 and rates it CVSS 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating remote exploitation without privileges or user interaction and a confidentiality impact.

Vendor
Dlink
Product
CVE-2016-10184
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-30
Original CVE updated
2026-05-13
Advisory published
2017-01-30
Advisory updated
2026-05-13

Who should care

Operators, administrators, and security teams responsible for D-Link DWR-932B devices, especially firmware identified by NVD as dwr-932b_firmware 02.02eu revb. Internet-exposed routers and environments that rely on this model for remote access or edge connectivity should treat this as a priority issue.

Technical summary

NVD lists CVE-2016-10184 as a CWE-22 path traversal vulnerability affecting D-Link DWR-932B firmware 02.02eu revb. The issue is described as qmiweb allowing file reading via ..%2f traversal. The published CVSS v3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates the attack is network-reachable, low-complexity, requires no authentication, and can lead to high confidentiality impact.

Defensive priority

High. The vulnerability is remotely reachable and requires no privileges or user interaction, so exposed devices should be reviewed promptly. Treat any internet-facing or otherwise accessible DWR-932B deployment as urgent to assess and contain.

Recommended defensive actions

  • Inventory D-Link DWR-932B devices and confirm whether the affected firmware family listed by NVD (02.02eu revb) is present.
  • Restrict network exposure immediately; remove direct internet access and limit management interfaces to trusted administrative networks.
  • Apply any vendor-provided firmware update or mitigation for the affected model if available through D-Link support channels.
  • If no fix is available, isolate, replace, or decommission affected devices in high-risk environments.
  • Review logs and access patterns for signs of unexpected file access attempts against the router management interface.
  • Validate that backup, configuration, and credential files stored on affected devices are protected or migrated off-device where possible.

Evidence notes

This debrief is based on the NVD record for CVE-2016-10184 and its cited references. NVD identifies the weakness as CWE-22, the vulnerable CPE as cpe:2.3:o:dlink:dwr-932b_firmware:02.02eu:revb:*:*:*:*:*:*, and the CVSS vector as AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The source references include a SecurityFocus BID entry and a technical advisory by Pierre Kim dated 2016-09-28, which describes the D-Link DWR-932B vulnerabilities referenced by NVD.

Official resources

CVE-2016-10184 was published in CVE/NVD on 2017-01-30. The NVD record was modified on 2026-05-13. The referenced technical advisory dates to 2016-09-28, so that source predates the CVE publication date and should not be treated as the CVE's