Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

D-Link — Vulnerabilities & Security Advisories 764

Browse all 764 CVE security advisories affecting D-Link. AI-powered Chinese analysis, POCs, and references for each vulnerability.

D-Link manufactures networking hardware, primarily consumer-grade routers and wireless access points, serving as a critical infrastructure component for home and small business internet connectivity. The company’s product line has historically been plagued by significant security deficiencies, resulting in 760 recorded Common Vulnerabilities and Exposures. These flaws frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from hardcoded credentials or unpatched firmware updates. A notable incident occurred in 2017 when a critical vulnerability allowed attackers to gain administrative control over millions of devices, facilitating large-scale botnet recruitment. The persistent lack of timely security patches and weak default configurations have established a pattern of neglect, leaving users exposed to persistent threats. This track record highlights systemic issues in the development and maintenance lifecycle of D-Link’s network equipment, necessitating rigorous user-side security measures.

CVE IDTitleCVSSSeverityPublished
CVE-2023-50205 D-Link G416 awsfile chmod Command Injection Remote Code Execution Vulnerability — G416CWE-78 8.8 -2024-05-03
CVE-2023-50203 D-Link G416 nodered chmod Command Injection Remote Code Execution Vulnerability — G416CWE-78 8.8 -2024-05-03
CVE-2023-50202 D-Link G416 flupl pythonmodules Command Injection Remote Code Execution Vulnerability — G416CWE-78 8.8 -2024-05-03
CVE-2023-50201 D-Link G416 cfgsave upusb Command Injection Remote Code Execution Vulnerability — G416CWE-78 8.8 -2024-05-03
CVE-2023-50200 D-Link G416 cfgsave backusb Command Injection Remote Code Execution Vulnerability — G416CWE-78 8.8 -2024-05-03
CVE-2023-50199 D-Link G416 httpd Missing Authentication for Critical Function Remote Code Execution Vulnerability — G416CWE-306 8.8 -2024-05-03
CVE-2023-50198 D-Link G416 cfgsave Command Injection Remote Code Execution Vulnerability — G416CWE-78 8.8 -2024-05-03
CVE-2023-44426 D-Link DIR-X3260 SetSysEmailSettings AccountPassword Command Injection Remote Code Execution Vulnerability — DIR-X3260CWE-78 8.0 -2024-05-03
CVE-2023-44427 D-Link DIR-X3260 SetSysEmailSettings SMTPServerAddress Command Injection Remote Code Execution Vulnerability — DIR-X3260CWE-78 8.8 -2024-05-03
CVE-2023-44425 D-Link DIR-X3260 SetSysEmailSettings AccountName Command Injection Remote Code Execution Vulnerability — DIR-X3260CWE-78 8.0 -2024-05-03
CVE-2023-44423 D-Link DIR-X3260 SetTriggerPPPoEValidate Password Command Injection Remote Code Execution Vulnerability — DIR-X3260CWE-78 8.0 -2024-05-03
CVE-2023-44424 D-Link DIR-X3260 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulnerability — DIR-X3260CWE-78 8.0 -2024-05-03
CVE-2023-44422 D-Link DIR-X3260 SetSysEmailSettings EmailFrom Command Injection Remote Code Execution Vulnerability — DIR-X3260CWE-78 8.0 -2024-05-03
CVE-2023-44421 D-Link DIR-X3260 SetTriggerPPPoEValidate Username Command Injection Remote Code Execution Vulnerability — DIR-X3260CWE-78 8.8 -2024-05-03
CVE-2023-44420 D-Link DIR-X3260 prog.cgi Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability — DIR-X3260CWE-303 8.8 -2024-05-03
CVE-2023-44419 D-Link DIR-X3260 Prog.cgi Stack-based Buffer Overflow Remote Code Execution Vulnerability — DIR-X3260CWE-121 8.8 -2024-05-03
CVE-2023-44418 D-Link DIR-X3260 Prog.cgi Heap-based Buffer Overflow Remote Code Execution Vulnerability — DIR-X3260CWE-122 8.8 -2024-05-03
CVE-2023-44417 D-Link DAP-2622 DDP Set IPv4 Address Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability — DAP-2622CWE-121 8.8 -2024-05-03
CVE-2023-44416 D-Link DAP-2622 Telnet CLI Command Injection Remote Code Execution Vulnerability — DAP-2622CWE-78 8.0 -2024-05-03
CVE-2023-44415 D-Link Multiple Routers cli Command Injection Remote Code Execution Vulnerability — DIR-2150CWE-78 8.0 -2024-05-03
CVE-2023-44414 D-Link D-View coreservice_action_script Exposed Dangerous Function Remote Code Execution Vulnerability — D-ViewCWE-749 9.8 -2024-05-03
CVE-2023-44413 D-Link D-View shutdown_coreserver Missing Authentication Denial-of-Service Vulnerability — D-ViewCWE-306 7.5 -2024-05-03
CVE-2023-44412 D-Link D-View addDv7Probe XML External Entity Processing Information Disclosure Vulnerability — D-ViewCWE-611 7.5 -2024-05-03
CVE-2023-44411 D-Link D-View InstallApplication Use of Hard-coded Credentials Authentication Bypass Vulnerability — D-ViewCWE-798 9.8 -2024-05-03
CVE-2023-44410 D-Link D-View showUsers Improper Authorization Privilege Escalation Vulnerability — D-ViewCWE-285 8.8 -2024-05-03
CVE-2023-44409 D-Link DAP-1325 SetSetupWizardStatus Enabled Stack-based Buffer Overflow Remote Code Execution Vulnerability — DAP-1325CWE-121 8.8 -2024-05-03
CVE-2023-44408 D-Link DAP-1325 SetAPLanSettings IPAddr Stack-based Buffer Overflow Remote Code Execution Vulnerability — DAP-1325CWE-121 8.8 -2024-05-03
CVE-2023-44406 D-Link DAP-1325 SetAPLanSettings DeviceName Stack-based Buffer Overflow Remote Code Execution Vulnerability — DAP-1325CWE-121 8.8 -2024-05-03
CVE-2023-44407 D-Link DAP-1325 SetAPLanSettings Gateway Stack-based Buffer Overflow Remote Code Execution Vulnerability — DAP-1325CWE-121 8.8 -2024-05-03
CVE-2023-44405 D-Link DAP-1325 get_value_of_key Stack-based Buffer Overflow Remote Code Execution Vulnerability — DAP-1325CWE-121 8.8 -2024-05-03

This page lists every published CVE security advisory associated with D-Link. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.