Vulnerabilities (CVE)

Filtered by vendor Dlink Subscribe
Total 1501 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-9727 1 Dlink 2 Dir-816l, Dir-816l Firmware 2025-10-01 6.5 MEDIUM 6.3 MEDIUM
A weakness has been identified in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-51281 1 Dlink 2 Di-8100, Di-8100 Firmware 2025-10-01 N/A 7.0 HIGH
D-Link DI-8100 16.07.26A1 is vulnerable to Buffer Overflow via the en`, `val and id parameters in the qj_asp function. This vulnerability allows authenticated attackers to cause a Denial of Service (DoS) by sending crafted GET requests with overly long values for these parameters.
CVE-2025-29523 1 Dlink 2 Dsl-7740c, Dsl-7740c Firmware 2025-10-01 N/A 7.2 HIGH
D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the ping6 function.
CVE-2024-41610 1 Dlink 2 Dir-820lw, Dir-820lw Firmware 2025-09-29 N/A 9.8 CRITICAL
D-Link DIR-820LW REVB FIRMWARE PATCH 2.03.B01_TC contains hardcoded credentials in the Telnet service, enabling attackers to log in remotely to the Telnet service and perform arbitrary commands.
CVE-2025-9938 1 Dlink 2 Di-8400, Di-8400 Firmware 2025-09-29 9.0 HIGH 8.8 HIGH
A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
CVE-2025-10034 1 Dlink 2 Dir-825, Dir-825 Firmware 2025-09-29 9.0 HIGH 8.8 HIGH
A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-10093 1 Dlink 2 Dir-852, Dir-852 Firmware 2025-09-29 5.0 MEDIUM 5.3 MEDIUM
A vulnerability was identified in D-Link DIR-852 up to 1.00CN B09. Affected by this vulnerability is the function phpcgi_main of the file /getcfg.php of the component Device Configuration Handler. Such manipulation leads to information disclosure. The attack may be performed from remote. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2024-41611 1 Dlink 2 Dir-860l, Dir-860l Firmware 2025-09-29 N/A 9.8 CRITICAL
In D-Link DIR-860L REVA FIRMWARE PATCH 1.10..B04, the Telnet service contains hardcoded credentials, enabling attackers to log in remotely to the Telnet service and perform arbitrary commands.
CVE-2025-55611 1 Dlink 2 Dir-619l, Dir-619l Firmware 2025-09-26 N/A 7.5 HIGH
D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formLanguageChange function via the nextPage parameter.
CVE-2025-55602 1 Dlink 2 Dir-619l, Dir-619l Firmware 2025-09-26 N/A 7.5 HIGH
D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formSysCmd function via the submit-url parameter.
CVE-2025-55599 1 Dlink 2 Dir-619l, Dir-619l Firmware 2025-09-26 N/A 7.5 HIGH
D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formWlanSetup function via the parameter f_wds_wepKey.
CVE-2025-10779 1 Dlink 2 Dcs-935l, Dcs-935l Firmware 2025-09-25 9.0 HIGH 8.8 HIGH
A vulnerability was found in D-Link DCS-935L up to 1.13.01. The impacted element is the function sub_402280 of the file /HNAP1/. The manipulation of the argument HNAP_AUTH/SOAPAction results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-57637 1 Dlink 2 Di-7100g, Di-7100g Firmware 2025-09-25 N/A 7.5 HIGH
Buffer overflow vulnerability in D-Link DI-7100G 2020-02-21 in the sub_451754 function of the jhttpd service in the viav4 parameter allowing attackers to cause a denial of service or execute arbitrary code.
CVE-2025-57636 1 Dlink 2 Di-7100g, Di-7100g Firmware 2025-09-25 N/A 6.5 MEDIUM
OS Command injection vulnerability in D-Link C1 2020-02-21. The sub_47F028 function in jhttpd contains a command injection vulnerability via the HTTP parameter "time".
CVE-2025-10123 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-09-24 7.5 HIGH 7.3 HIGH
A vulnerability was determined in D-Link DIR-823X up to 250416. Affected by this vulnerability is the function sub_415028 of the file /goform/set_static_leases. Executing manipulation of the argument Hostname can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
CVE-2025-10634 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-09-24 6.5 MEDIUM 6.3 MEDIUM
A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
CVE-2025-10814 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-09-24 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was determined in D-Link DIR-823X 240126/240802/250416. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/goahead. This manipulation of the argument port causes command injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
CVE-2025-10401 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-09-24 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
CVE-2025-0492 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-09-24 7.8 HIGH 7.5 HIGH
A vulnerability has been found in D-Link DIR-823X 240126/240802 and classified as critical. Affected by this vulnerability is the function FUN_00412244. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2018-25115 1 Dlink 14 Dir-110, Dir-110 Firmware, Dir-412 and 11 more 2025-09-24 N/A 9.8 CRITICAL
Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter, which is passed directly to the system shell without sanitization. A crafted HTTP POST request can inject commands that are executed with root privileges, resulting in full device compromise. These router models are no longer supported at the time of assignment and affected version ranges may vary. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-08-21 UTC.