Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

D-Link — Vulnerabilities & Security Advisories 764

Browse all 764 CVE security advisories affecting D-Link. AI-powered Chinese analysis, POCs, and references for each vulnerability.

D-Link manufactures networking hardware, primarily consumer-grade routers and wireless access points, serving as a critical infrastructure component for home and small business internet connectivity. The company’s product line has historically been plagued by significant security deficiencies, resulting in 760 recorded Common Vulnerabilities and Exposures. These flaws frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from hardcoded credentials or unpatched firmware updates. A notable incident occurred in 2017 when a critical vulnerability allowed attackers to gain administrative control over millions of devices, facilitating large-scale botnet recruitment. The persistent lack of timely security patches and weak default configurations have established a pattern of neglect, leaving users exposed to persistent threats. This track record highlights systemic issues in the development and maintenance lifecycle of D-Link’s network equipment, necessitating rigorous user-side security measures.

CVE IDTitleCVSSSeverityPublished
CVE-2023-35724 D-Link DAP-2622 Telnet CLI Use of Hardcoded Credentials Authentication Bypass Vulnerability — DAP-2622CWE-798 8.8 -2024-05-03
CVE-2023-35725 D-Link DAP-2622 DDP User Verification Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability — DAP-2622CWE-121 8.8 -2024-05-03
CVE-2023-35723 D-Link DIR-X3260 prog.cgi SOAPAction Command Injection Remote Code Execution Vulnerability — DIR-X3260CWE-78 8.8 -2024-05-03
CVE-2023-35718 D-Link DAP-2622 DDP Change ID Password Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability — DAP-2622CWE-121 8.8 -2024-05-03
CVE-2023-34282 D-Link DIR-2150 HNAP Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability — DIR-2150CWE-303 8.8 -2024-05-03
CVE-2023-34280 D-Link DIR-2150 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulnerability — DIR-2150CWE-78 8.0 -2024-05-03
CVE-2023-34281 D-Link DIR-2150 GetFirmwareStatus Target Command Injection Remote Code Execution Vulnerability — DIR-2150CWE-78 8.0 -2024-05-03
CVE-2023-34279 D-Link DIR-2150 GetDeviceSettings Target Command Injection Remote Code Execution Vulnerability — DIR-2150CWE-78 8.8 -2024-05-03
CVE-2023-34278 D-Link DIR-2150 SetSysEmailSettings EmailFrom Command Injection Remote Code Execution Vulnerability — DIR-2150CWE-78 8.0 -2024-05-03
CVE-2023-34277 D-Link DIR-2150 SetSysEmailSettings AccountName Command Injection Remote Code Execution Vulnerability — DIR-2150CWE-78 8.0 -2024-05-03
CVE-2023-34276 D-Link DIR-2150 SetTriggerPPPoEValidate Username Command Injection Remote Code Execution Vulnerability — DIR-2150CWE-78 8.8 -2024-05-03
CVE-2023-34275 D-Link DIR-2150 SetNTPServerSettings Command Injection Remote Code Execution Vulnerability — DIR-2150CWE-78 8.0 -2024-05-03
CVE-2023-34274 D-Link DIR-2150 LoginPassword Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability — DIR-2150CWE-303 8.8 -2024-05-03
CVE-2023-32169 D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability — D-ViewCWE-321 9.8 -2024-05-03
CVE-2023-32168 D-Link D-View showUser Improper Authorization Privilege Escalation Vulnerability — D-ViewCWE-285 8.8 -2024-05-03
CVE-2023-32167 D-Link D-View uploadMib Directory Traversal Arbitrary File Creation or Deletion Vulnerability — D-ViewCWE-22 8.1 -2024-05-03
CVE-2023-32166 D-Link D-View uploadFile Directory Traversal Arbitrary File Creation Vulnerability — D-ViewCWE-22 8.1 -2024-05-03
CVE-2023-32165 D-Link D-View TftpReceiveFileHandler Directory Traversal Remote Code Execution Vulnerability — D-ViewCWE-22 9.8 -2024-05-03
CVE-2023-32164 D-Link D-View TftpSendFileThread Directory Traversal Information Disclosure Vulnerability — D-ViewCWE-22 7.5 -2024-05-03
CVE-2023-32153 D-Link DIR-2640 EmailFrom Command Injection Remote Code Execution Vulnerability — DIR-2640CWE-78 8.0 -2024-05-03
CVE-2023-32152 D-Link DIR-2640 HNAP LoginPassword Authentication Bypass Vulnerability — DIR-2640CWE-303 8.8 -2024-05-03
CVE-2023-32151 D-Link DIR-2640 DestNetwork Command Injection Remote Code Execution Vulnerability — DIR-2640CWE-78 8.0 -2024-05-03
CVE-2023-32150 D-Link DIR-2640 PrefixLen Command Injection Remote Code Execution Vulnerability — DIR-2640CWE-78 8.0 -2024-05-03
CVE-2023-32149 D-Link DIR-2640 prog.cgi Request Handling Stack-based Buffer Overflow Remote Code Execution Vulnerability — DIR-2640CWE-121 8.8 -2024-05-03
CVE-2023-32148 D-Link DIR-2640 HNAP PrivateLogin Authentication Bypass Vulnerability — DIR-2640CWE-303 8.8 -2024-05-03
CVE-2023-32146 D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote Code Execution Vulnerability — DAP-1360CWE-121 8.8 -2024-05-03
CVE-2023-32147 D-Link DIR-2640 LocalIPAddress Command Injection Remote Code Execution Vulnerability — DIR-2640CWE-78 8.0 -2024-05-03
CVE-2023-32145 D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability — DAP-1360CWE-259 8.8 -2024-05-03
CVE-2023-32144 D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execution Vulnerability — DAP-1360CWE-121 8.8 -2024-05-03
CVE-2023-32143 D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerability — DAP-1360CWE-197 8.8 -2024-05-03

This page lists every published CVE security advisory associated with D-Link. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.