Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

D-Link — Vulnerabilities & Security Advisories 764

Browse all 764 CVE security advisories affecting D-Link. AI-powered Chinese analysis, POCs, and references for each vulnerability.

D-Link manufactures networking hardware, primarily consumer-grade routers and wireless access points, serving as a critical infrastructure component for home and small business internet connectivity. The company’s product line has historically been plagued by significant security deficiencies, resulting in 760 recorded Common Vulnerabilities and Exposures. These flaws frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from hardcoded credentials or unpatched firmware updates. A notable incident occurred in 2017 when a critical vulnerability allowed attackers to gain administrative control over millions of devices, facilitating large-scale botnet recruitment. The persistent lack of timely security patches and weak default configurations have established a pattern of neglect, leaving users exposed to persistent threats. This track record highlights systemic issues in the development and maintenance lifecycle of D-Link’s network equipment, necessitating rigorous user-side security measures.

CVE IDTitleCVSSSeverityPublished
CVE-2023-5146 D-Link DAR-7000/DAR-8000 updatelib.php unrestricted upload — DAR-7000CWE-434 6.3 Medium2023-09-25
CVE-2023-5145 D-Link DAR-7000 licence.php unrestricted upload — DAR-7000CWE-434 6.3 Medium2023-09-24
CVE-2023-5144 D-Link DAR-7000/DAR-8000 updateos.php unrestricted upload — DAR-7000CWE-434 6.3 Medium2023-09-24
CVE-2023-5143 D-Link DAR-7000 webmailattach.php Privilege Escalation — DAR-7000 6.3 Medium2023-09-24
CVE-2023-5074 Authentication Bypass in D-Link D-View 8 — D-View 8CWE-798 9.8 Critical2023-09-20
CVE-2023-4711 D-Link DAR-8000-10 decodmail.php os command injection — DAR-8000-10CWE-78 5.0 Medium2023-09-01
CVE-2023-4542 D-Link DAR-8000-10 sys1.php os command injection — DAR-8000-10CWE-78 6.3 Medium2023-08-25
CVE-2023-32224 D-Link DSL-224 firmware version 3.0.10 CWE-307: Improper Restriction of Excessive Authentication Attempts — DSL-224 firmware version 3.0.10CWE-307 9.8 Critical2023-06-28
CVE-2023-32223 D-Link DSL-224 firmware version 3.0.10 post authentication command execution — DSL-224 firmware version 3.0.10 8.8 High2023-06-28
CVE-2023-32222 D-Link DSL-G256DG firmware version vBZ_1.00.27 Authentication Bypass — DSL-G256DG firmware version vBZ_1.00.27 9.8 Critical2023-06-28
CVE-2022-3210 D-Link DIR-2150 操作系统命令注入漏洞 — DIR-2150CWE-78 8.8 -2023-03-29
CVE-2022-43619 D-Link DIR-1935 格式化字符串错误漏洞 — DIR-1935CWE-134 6.8 -2023-03-29
CVE-2022-43620 D-Link DIR-1935 授权问题漏洞 — DIR-1935CWE-287 8.8 -2023-03-29
CVE-2022-43621 D-Link DIR-1935 安全漏洞 — DIR-1935CWE-697 8.8 -2023-03-29
CVE-2022-43622 D-Link DIR-1935 安全漏洞 — DIR-1935CWE-121 8.8 -2023-03-29
CVE-2022-43623 D-Link DIR-1935 命令注入漏洞 — DIR-1935CWE-77 6.8 -2023-03-29
CVE-2022-43624 D-Link DIR-1935 操作系统命令注入漏洞 — DIR-1935CWE-78 6.8 -2023-03-29
CVE-2022-43625 D-Link DIR-1935 安全漏洞 — DIR-1935CWE-121 6.8 -2023-03-29
CVE-2022-43626 D-Link DIR-1935 操作系统命令注入漏洞 — DIR-1935CWE-78 6.8 -2023-03-29
CVE-2022-43627 D-Link DIR-1935 操作系统命令注入漏洞 — DIR-1935CWE-78 6.8 -2023-03-29
CVE-2022-43628 D-Link DIR-1935 操作系统命令注入漏洞 — DIR-1935CWE-78 6.8 -2023-03-29
CVE-2022-43629 D-Link DIR-1935 操作系统命令注入漏洞 — DIR-1935CWE-78 6.8 -2023-03-29
CVE-2022-43630 D-Link DIR-1935 安全漏洞 — DIR-1935CWE-121 8.8 -2023-03-29
CVE-2022-43631 D-Link DIR-1935 操作系统命令注入漏洞 — DIR-1935CWE-78 6.8 -2023-03-29
CVE-2022-43632 D-Link DIR-1935 操作系统命令注入漏洞 — DIR-1935CWE-78 6.8 -2023-03-29
CVE-2022-43633 D-Link DIR-1935 操作系统命令注入漏洞 — DIR-1935CWE-78 6.8 -2023-03-29
CVE-2022-43642 D-Link DIR-825 操作系统命令注入漏洞 — DIR-825CWE-78 8.8 -2023-03-29
CVE-2022-43643 D-Link DIR-825 操作系统命令注入漏洞 — DIR-825CWE-78 8.8 -2023-03-29
CVE-2022-43644 D-Link DIR-825 操作系统命令注入漏洞 — DIR-825CWE-78 8.8 -2023-03-29
CVE-2022-43645 D-Link DIR-825 操作系统命令注入漏洞 — DIR-825CWE-78 8.8 -2023-03-29

This page lists every published CVE security advisory associated with D-Link. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.