Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

D-Link — Vulnerabilities & Security Advisories 764

Browse all 764 CVE security advisories affecting D-Link. AI-powered Chinese analysis, POCs, and references for each vulnerability.

D-Link manufactures networking hardware, primarily consumer-grade routers and wireless access points, serving as a critical infrastructure component for home and small business internet connectivity. The company’s product line has historically been plagued by significant security deficiencies, resulting in 760 recorded Common Vulnerabilities and Exposures. These flaws frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from hardcoded credentials or unpatched firmware updates. A notable incident occurred in 2017 when a critical vulnerability allowed attackers to gain administrative control over millions of devices, facilitating large-scale botnet recruitment. The persistent lack of timely security patches and weak default configurations have established a pattern of neglect, leaving users exposed to persistent threats. This track record highlights systemic issues in the development and maintenance lifecycle of D-Link’s network equipment, necessitating rigorous user-side security measures.

CVE IDTitleCVSSSeverityPublished
CVE-2026-5983 D-Link DIR-605L POST Request formSetDDNS buffer overflow — DIR-605LCWE-120 8.8 High2026-04-09
CVE-2026-5982 D-Link DIR-605L POST Request formAdvNetwork buffer overflow — DIR-605LCWE-120 8.8 High2026-04-09
CVE-2026-5981 D-Link DIR-605L POST Request formAdvFirewall buffer overflow — DIR-605LCWE-120 8.8 High2026-04-09
CVE-2026-5980 D-Link DIR-605L POST Request formSetMACFilter buffer overflow — DIR-605LCWE-120 8.8 High2026-04-09
CVE-2026-5979 D-Link DIR-605L POST Request formVirtualServ buffer overflow — DIR-605LCWE-120 8.8 High2026-04-09
CVE-2026-5844 D-Link DIR-882 HNAP1 SetNetworkSettings prog.cgi sprintf os command injection — DIR-882CWE-78 7.2 High2026-04-09
CVE-2026-5815 D-Link DIR-645 hedwig.cgi hedwigcgi_main stack-based overflow — DIR-645CWE-121 8.8 High2026-04-08
CVE-2026-5312 D-Link DNS-1550-04 dsk_mgr.cgi Get_current_raidtype access control — DNS-120CWE-284 5.3 Medium2026-04-01
CVE-2026-5311 D-Link DNS-1550-04 file_center.cgi Webdav_Access_List access control — DNS-120CWE-284 5.3 Medium2026-04-01
CVE-2026-5215 D-Link DNS-1550-04 network_mgr.cgi cgi_get_ipv6 access control — DNS-120CWE-284 4.3 Medium2026-03-31
CVE-2026-5214 D-Link DNS-1550-04 account_mgr.cgi cgi_addgroup_get_group_quota_minsize stack-based overflow — DNS-120CWE-121 8.8 High2026-03-31
CVE-2026-5213 D-Link DNS-1550-04 account_mgr.cgi cgi_adduser_to_session stack-based overflow — DNS-120CWE-121 8.8 High2026-03-31
CVE-2026-5212 D-Link DNS-1550-04 webdav_mgr.cgi Webdav_Upload_File stack-based overflow — DNS-120CWE-121 8.8 High2026-03-31
CVE-2026-5211 D-Link DNS-1550-04 app_mgr.cgi UPnP_AV_Server_Path_Del stack-based overflow — DNS-120CWE-121 8.8 High2026-03-31
CVE-2026-5024 D-Link DIR-513 formSetEmail stack-based overflow — DIR-513CWE-121 8.8 High2026-03-29
CVE-2026-4627 D-Link DIR-825/DIR-825R NTP Service libdeuteron_modules.so handler_update_system_time os command injection — DIR-825CWE-78 7.2 High2026-03-24
CVE-2026-4555 D-Link DIR-513 boa formEasySetTimezone memory corruption — DIR-513CWE-121 8.8 High2026-03-22
CVE-2026-4529 D-Link DHP-1320 SOAP redirect_count_down_page stack-based overflow — DHP-1320CWE-121 8.8 High2026-03-21
CVE-2026-4499 D-Link DIR-820LW SSDP ssdpcgi_main os command injection — DIR-820LWCWE-78 7.3 High2026-03-20
CVE-2026-4486 D-Link DIR-513 Web Service formEasySetPassword stack-based overflow — DIR-513CWE-121 8.8 High2026-03-20
CVE-2026-4465 D-Link DIR-513 formSysCmd os command injection — DIR-513CWE-78 6.3 Medium2026-03-20
CVE-2026-4214 D-Link DNS-1550-04 app_mgr.cgi UPnP_AV_Server_Path_Setting stack-based overflow — DNS-120CWE-121 8.8 High2026-03-16
CVE-2026-4213 D-Link DNS-1550-04 gui_mgr.cgi cgi_myfavorite_verify stack-based overflow — DNS-120CWE-121 8.8 High2026-03-16
CVE-2026-4212 D-Link DNS-1550-04 download_mgr.cgi Downloads_Schedule_Info stack-based overflow — DNS-120CWE-121 8.8 High2026-03-16
CVE-2026-4211 D-Link DNS-1550-04 local_backup_mgr.cgi Local_Backup_Info stack-based overflow — DNS-120CWE-121 8.8 High2026-03-16
CVE-2026-4210 D-Link DNS-1550-04 time_machine.cgi cgi_tm_set_share command injection — DNS-120CWE-77 6.3 Medium2026-03-16
CVE-2026-4209 D-Link DNS-1550-04 account_mgr.cgi cgi_chg_admin_pw command injection — DNS-120CWE-77 6.3 Medium2026-03-16
CVE-2026-4207 D-Link DNS-1550-04 system_mgr.cgi cgi_ntp_time command injection — DNS-120CWE-77 6.3 Medium2026-03-16
CVE-2026-4206 D-Link DNS-1550-04 dsk_mgr.cgi ScanDisk_run_e2fsck command injection — DNS-120CWE-77 6.3 Medium2026-03-16
CVE-2026-4205 D-Link DNS-1550-04 app_mgr.cgi FTP_Server_BlockIP_Del command injection — DNS-120CWE-77 6.3 Medium2026-03-16

This page lists every published CVE security advisory associated with D-Link. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.