Vulnerabilities (CVE)

Filtered by vendor Dlink Subscribe
Total 1457 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-2051 1 Dlink 2 Dir-645, Dir-645 Firmware 2025-10-22 10.0 HIGH 9.8 CRITICAL
The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.
CVE-2013-5223 1 Dlink 2 Dsl-2760u, Dsl-2760u Firmware 2025-10-22 3.5 LOW 5.4 MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in D-Link DSL-2760U Gateway (Rev. E1) allow remote authenticated users to inject arbitrary web script or HTML via the (1) ntpServer1 parameter to sntpcfg.cgi, username parameter to (2) ddnsmngr.cmd or (3) todmngr.tod, (4) TodUrlAdd parameter to urlfilter.cmd, (5) appName parameter to scprttrg.cmd, (6) fltName in an add action or (7) rmLst parameter in a remove action to scoutflt.cmd, (8) groupName parameter to portmapcfg.cmd, (9) snmpRoCommunity parameter to snmpconfig.cgi, (10) fltName parameter to scinflt.cmd, (11) PolicyName in an add action or (12) rmLst parameter in a remove action to prmngr.cmd, (13) ippName parameter to ippcfg.cmd, (14) smbNetBiosName or (15) smbDirName parameter to samba.cgi, or (16) wlSsid parameter to wlcfg.wl.
CVE-2011-4723 1 Dlink 1 Dir-300 2025-10-22 6.8 MEDIUM 5.7 MEDIUM
The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors.
CVE-2015-1187 3 D-link, Dlink, Trendnet 30 Dir-626l Firmware, Dir-636l Firmware, Dir-651 Firmware and 27 more 2025-10-22 10.0 HIGH 9.8 CRITICAL
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.
CVE-2014-8361 3 Aterm, Dlink, Realtek 51 W1200ex, W1200ex-ms, W1200ex-ms Firmware and 48 more 2025-10-22 10.0 HIGH 9.8 CRITICAL
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
CVE-2025-10792 1 Dlink 2 Dir-513, Dir-513 Firmware 2025-10-08 9.0 HIGH 8.8 HIGH
A security vulnerability has been detected in D-Link DIR-513 A1FW110. Affected is an unknown function of the file /goform/formWPS. Such manipulation of the argument webpage leads to buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-55848 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-03 N/A 8.8 HIGH
An issue was discovered in DIR-823 firmware 20250416. There is an RCE vulnerability in the set_cassword settings interface, as the http_casswd parameter is not filtered by '&'to allow injection of reverse connection commands.
CVE-2025-9003 1 Dlink 2 Dir-818lw, Dir-818lw Firmware 2025-10-03 4.0 MEDIUM 3.5 LOW
A vulnerability has been found in D-Link DIR-818LW 1.04. This vulnerability affects unknown code of the file /bsc_lan.php of the component DHCP Reserved Address Handler. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-7932 1 Dlink 2 Dir-817l, Dir-817l Firmware 2025-10-03 6.5 MEDIUM 6.3 MEDIUM
A vulnerability classified as critical has been found in D-Link DIR‑817L up to 1.04B01. This affects the function lxmldbc_system of the file ssdpcgi. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-7836 1 Dlink 2 Dir-816l, Dir-816l Firmware 2025-10-03 6.5 MEDIUM 6.3 MEDIUM
A vulnerability has been found in D-Link DIR-816L up to 2.06B01 and classified as critical. Affected by this vulnerability is the function lxmldbc_system of the file /htdocs/cgibin of the component Environment Variable Handler. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-10689 1 Dlink 2 Dir-645, Dir-645 Firmware 2025-10-03 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was identified in D-Link DIR-645 105B01. This issue affects the function soapcgi_main of the file /soap.cgi. Such manipulation of the argument service leads to command injection. The attack can be launched remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-11092 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_switch_settings. This manipulation of the argument port causes command injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
CVE-2025-11095 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was detected in D-Link DIR-823X 250416. This vulnerability affects unknown code of the file /goform/delete_offline_device. Performing manipulation of the argument delvalue results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
CVE-2025-11096 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A flaw has been found in D-Link DIR-823X 250416. This issue affects some unknown processing of the file /goform/diag_traceroute. Executing manipulation of the argument target_addr can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used.
CVE-2025-11097 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A vulnerability has been found in D-Link DIR-823X 250416. Impacted is an unknown function of the file /goform/set_device_name. The manipulation of the argument mac leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-11098 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in D-Link DIR-823X 250416. The affected element is an unknown function of the file /goform/set_wifi_blacklists. The manipulation of the argument macList results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.
CVE-2025-11099 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was determined in D-Link DIR-823X 250416. The impacted element is the function uci_del of the file /goform/delete_prohibiting. This manipulation of the argument delvalue causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
CVE-2025-11100 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-10-02 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was identified in D-Link DIR-823X 250416. This affects the function uci_set of the file /goform/set_wifi_blacklists. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
CVE-2025-57105 1 Dlink 2 Di-7400g\+, Di-7400g\+ Firmware 2025-10-02 N/A 9.8 CRITICAL
The DI-7400G+ router has a command injection vulnerability, which allows attackers to execute arbitrary commands on the device. The sub_478D28 function in in mng_platform.asp, and sub_4A12DC function in wayos_ac_server.asp of the jhttpd program, with the parameter ac_mng_srv_host.
CVE-2025-9727 1 Dlink 2 Dir-816l, Dir-816l Firmware 2025-10-01 6.5 MEDIUM 6.3 MEDIUM
A weakness has been identified in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.