Filtered by vendor Dlink Subscriptions
Total 1544 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-60558 2 D-link, Dlink 3 Dir-600l, Dir-600l, Dir-600l Firmware 2025-10-28 7.5 High
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formVirtualServ.
CVE-2025-60561 2 D-link, Dlink 3 Dir-600l, Dir-600l, Dir-600l Firmware 2025-10-28 7.5 High
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetEmail.
CVE-2025-60562 2 D-link, Dlink 3 Dir-600l, Dir-600l, Dir-600l Firmware 2025-10-28 7.5 High
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formWlSiteSurvey.
CVE-2025-60564 2 D-link, Dlink 3 Dir-600l, Dir-600l, Dir-600l Firmware 2025-10-28 7.5 High
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetLog.
CVE-2025-60565 2 D-link, Dlink 3 Dir-600l, Dir-600l, Dir-600l Firmware 2025-10-28 7.5 High
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSchedule.
CVE-2025-60563 2 D-link, Dlink 3 Dir-600l, Dir-600l, Dir-600l Firmware 2025-10-27 7.5 High
D-Link DIR600L Ax FW116WWb01 was discovered to contain a buffer overflow via the curTime parameter in the function formSetPortTr.
CVE-2025-60331 1 Dlink 2 Dir-823g, Dir-823g Firmware 2025-10-24 7.5 High
D-Link DIR-823G A1 v1.0.2B05 was discovered to contain a buffer overflow in the FillMacCloneMac parameter in the /EXCU_SHELL endpoint. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2025-60332 2 D-link, Dlink 3 Dir-823g, Dir-823g, Dir-823g Firmware 2025-10-24 7.5 High
A NULL pointer dereference in the SetWLanRadioSettings function of D-Link DIR-823G A1 v1.0.2B05 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
CVE-2025-9727 2 D-link, Dlink 3 Dir-816l, Dir-816l, Dir-816l Firmware 2025-10-23 6.3 Medium
A weakness has been identified in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-60344 1 Dlink 3 Dsr-150, Dsr-150n, Dsr-250n 2025-10-23 6.6 Medium
An unauthenticated Local File Inclusion (LFI) vulnerability in D-Link DSR series routers allows remote attackers to retrieve sensitive configuration files in clear text. The exposed files contain administrative credentials, VPN settings, and other sensitive information, enabling full administrative access to the router. Affected Products include: DSR-150, DSR-150N, and DSR-250N v1.09B32_WW.
CVE-2015-2051 1 Dlink 2 Dir-645, Dir-645 Firmware 2025-10-22 8.8 High
The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.
CVE-2014-100005 1 Dlink 2 Dir-600, Dir-600 Firmware 2025-10-22 8 High
Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php.
CVE-2013-5223 1 Dlink 2 Dsl-2760u, Dsl-2760u Firmware 2025-10-22 5.4 Medium
Multiple cross-site scripting (XSS) vulnerabilities in D-Link DSL-2760U Gateway (Rev. E1) allow remote authenticated users to inject arbitrary web script or HTML via the (1) ntpServer1 parameter to sntpcfg.cgi, username parameter to (2) ddnsmngr.cmd or (3) todmngr.tod, (4) TodUrlAdd parameter to urlfilter.cmd, (5) appName parameter to scprttrg.cmd, (6) fltName in an add action or (7) rmLst parameter in a remove action to scoutflt.cmd, (8) groupName parameter to portmapcfg.cmd, (9) snmpRoCommunity parameter to snmpconfig.cgi, (10) fltName parameter to scinflt.cmd, (11) PolicyName in an add action or (12) rmLst parameter in a remove action to prmngr.cmd, (13) ippName parameter to ippcfg.cmd, (14) smbNetBiosName or (15) smbDirName parameter to samba.cgi, or (16) wlSsid parameter to wlcfg.wl.
CVE-2011-4723 1 Dlink 1 Dir-300 2025-10-22 5.7 Medium
The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors.
CVE-2016-20017 1 Dlink 2 Dsl-2750b, Dsl-2750b Firmware 2025-10-22 9.8 Critical
D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022.
CVE-2016-11021 1 Dlink 2 Dcs-930l, Dcs-930l Firmware 2025-10-22 7.2 High
setSystemCommand on D-Link DCS-930L devices before 2.12 allows a remote attacker to execute code via an OS command in the SystemCommand parameter.
CVE-2015-1187 2 Dlink, Trendnet 30 Dir-626l, Dir-626l Firmware, Dir-636l and 27 more 2025-10-22 9.8 Critical
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.
CVE-2014-8361 3 Aterm, Dlink, Realtek 51 W1200ex, W1200ex-ms, W1200ex-ms Firmware and 48 more 2025-10-22 9.8 Critical
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
CVE-2025-10792 2 D-link, Dlink 3 Dir-513, Dir-513, Dir-513 Firmware 2025-10-08 8.8 High
A security vulnerability has been detected in D-Link DIR-513 A1FW110. Affected is an unknown function of the file /goform/formWPS. Such manipulation of the argument webpage leads to buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-55848 1 Dlink 3 Dir-823, Dir-823x, Dir-823x Firmware 2025-10-03 8.8 High
An issue was discovered in DIR-823 firmware 20250416. There is an RCE vulnerability in the set_cassword settings interface, as the http_casswd parameter is not filtered by '&'to allow injection of reverse connection commands.