Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

D-Link — Vulnerabilities & Security Advisories 764

Browse all 764 CVE security advisories affecting D-Link. AI-powered Chinese analysis, POCs, and references for each vulnerability.

D-Link manufactures networking hardware, primarily consumer-grade routers and wireless access points, serving as a critical infrastructure component for home and small business internet connectivity. The company’s product line has historically been plagued by significant security deficiencies, resulting in 760 recorded Common Vulnerabilities and Exposures. These flaws frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from hardcoded credentials or unpatched firmware updates. A notable incident occurred in 2017 when a critical vulnerability allowed attackers to gain administrative control over millions of devices, facilitating large-scale botnet recruitment. The persistent lack of timely security patches and weak default configurations have established a pattern of neglect, leaving users exposed to persistent threats. This track record highlights systemic issues in the development and maintenance lifecycle of D-Link’s network equipment, necessitating rigorous user-side security measures.

Found 22 results / 764Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-7857 D-Link DI-8100 CGI user_group.asp sprintf buffer overflow — DI-8100CWE-120 7.2 High2026-05-05
CVE-2026-7856 D-Link DI-8100 Web Management url_member.asp buffer overflow — DI-8100CWE-120 7.2 High2026-05-05
CVE-2026-7855 D-Link DI-8100 HTTP Request tggl.asp tggl_asp buffer overflow — DI-8100CWE-120 8.8 High2026-05-05
CVE-2026-7854 D-Link DI-8100 POST Parameter url_rule.asp url_rule_asp buffer overflow — DI-8100CWE-120 9.8 Critical2026-05-05
CVE-2026-7853 D-Link DI-8100 HTTP auto_reboot.asp sprintf buffer overflow — DI-8100CWE-120 9.8 Critical2026-05-05
CVE-2026-7851 D-Link DI-8100 yyxz.asp sprintf stack-based overflow — DI-8100CWE-121 7.2 High2026-05-05
CVE-2026-7248 D-Link DI-8100 CGI Endpoint tgfile.htm tgfile_htm buffer overflow — DI-8100CWE-120 9.8 Critical2026-04-28
CVE-2026-7247 D-Link DI-8100 File Extension file_exten.asp file_exten_asp buffer overflow — DI-8100CWE-120 7.2 High2026-04-28
CVE-2025-10440 D-Link DI-8100/DI-8100G/DI-8200/DI-8200G/DI-8003/DI-8003G jhttpd usb_paswd.asp sub_4621DC os command injection — DI-8100CWE-78 6.3 Medium2025-09-15
CVE-2025-7911 D-Link DI-8100 jhttpd upnp_ctrl.asp sprintf stack-based overflow — DI-8100CWE-121 8.8 High2025-07-20
CVE-2025-7908 D-Link DI-8100 jhttpd ddns.asp sprintf stack-based overflow — DI-8100CWE-121 8.8 High2025-07-20
CVE-2025-7790 D-Link DI-8100 HTTP Request menu_nat.asp stack-based overflow — DI-8100CWE-121 8.8 High2025-07-18
CVE-2025-7762 D-Link DI-8100 HTTP Request menu_nat_more.asp stack-based overflow — DI-8100CWE-121 8.8 High2025-07-17
CVE-2025-7603 D-Link DI-8100 HTTP Request jingx.asp stack-based overflow — DI-8100CWE-121 7.2 High2025-07-14
CVE-2025-7602 D-Link DI-8100 HTTP Request arp_sys.asp stack-based overflow — DI-8100CWE-121 7.2 High2025-07-14
CVE-2025-6881 D-Link DI-8100 jhttpd pppoe_base.asp buffer overflow — DI-8100CWE-120 8.8 High2025-06-30
CVE-2025-5228 D-Link DI-8100 jhttpd login.cgi httpd_get_parm stack-based overflow — DI-8100CWE-121 8.8 High2025-05-27
CVE-2025-4883 D-Link DI-8100 Connection Limit Page ctxz.asp ctxz_asp stack-based overflow — DI-8100CWE-121 7.2 High2025-05-18
CVE-2025-4544 D-Link DI-8100 jhttpd ddos.asp stack-based overflow — DI-8100CWE-121 6.6 Medium2025-05-11
CVE-2025-3538 D-Link DI-8100 jhttpd auth.asp auth_asp stack-based overflow — DI-8100CWE-121 8.8 High2025-04-13
CVE-2024-7833 D-Link DI-8100 upgrade_filter.asp upgrade_filter_asp command injection — DI-8100CWE-77 6.3 Medium2024-08-15
CVE-2024-7436 D-Link DI-8100 msp_info.htm msp_info_htm command injection — DI-8100CWE-77 6.3 Medium2024-08-03

This page lists every published CVE security advisory associated with D-Link. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.