Vulnerabilities (CVE)

Filtered by vendor Dlink Subscribe
Total 1420 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-9752 1 Dlink 2 Dir-852, Dir-852 Firmware 2025-09-04 7.5 HIGH 7.3 HIGH
A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-9745 1 Dlink 2 Di-500wf, Di-500wf Firmware 2025-09-04 5.8 MEDIUM 4.7 MEDIUM
A security vulnerability has been detected in D-Link DI-500WF 14.04.10A1T. The impacted element is an unknown function of the file /version_upgrade.asp of the component jhttpd. The manipulation of the argument path leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
CVE-2025-9769 1 Dlink 2 Di-7400g\+, Di-7400g\+ Firmware 2025-09-04 4.3 MEDIUM 4.1 MEDIUM
A security flaw has been discovered in D-Link DI-7400G+ 19.12.25A1. Affected is the function sub_478D28 of the file /mng_platform.asp. The manipulation of the argument addr with the input `echo 12345 > poc.txt` results in command injection. An attack on the physical device is feasible. The exploit has been released to the public and may be exploited.
CVE-2024-5292 1 Dlink 1 Network Assistant 2025-09-04 N/A 7.8 HIGH
D-Link Network Assistant Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of D-Link Network Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DNACore service. The service loads a file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21426.
CVE-2025-29514 1 Dlink 2 Dsl-7740c, Dsl-7740c Firmware 2025-09-02 N/A 9.8 CRITICAL
Incorrect access control in the config.xgi function of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to download the configuration file via providing a crafted web request.
CVE-2025-29515 1 Dlink 2 Dsl-7740c, Dsl-7740c Firmware 2025-09-02 N/A 9.8 CRITICAL
Incorrect access control in the DELT_file.xgi endpoint of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to modify arbitrary settings within the device's XML database, including the administrator’s password.
CVE-2025-29516 1 Dlink 2 Dsl-7740c, Dsl-7740c Firmware 2025-09-02 N/A 7.2 HIGH
D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the backup function.
CVE-2025-29517 1 Dlink 2 Dsl-7740c, Dsl-7740c Firmware 2025-09-02 N/A 6.8 MEDIUM
D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the traceroute6 function.
CVE-2025-29519 1 Dlink 2 Dsl-7740c, Dsl-7740c Firmware 2025-09-02 N/A 5.3 MEDIUM
A command injection vulnerability in the EXE parameter of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to execute arbitrary commands via supplying a crafted GET request.
CVE-2025-29520 1 Dlink 2 Dsl-7740c, Dsl-7740c Firmware 2025-09-02 N/A 5.3 MEDIUM
Incorrect access control in the Maintenance module of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows authenticated attackers with low-level privileges to arbitrarily change the high-privileged account passwords and escalate privileges.
CVE-2025-29521 1 Dlink 2 Dsl-7740c, Dsl-7740c Firmware 2025-09-02 N/A 5.3 MEDIUM
Insecure default credentials for the Adminsitrator account of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to escalate privileges via a bruteforce attack.
CVE-2025-29522 1 Dlink 2 Dsl-7740c, Dsl-7740c Firmware 2025-09-02 N/A 6.5 MEDIUM
D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the ping function.
CVE-2025-55611 1 Dlink 2 Dir-619l, Dir-619l Firmware 2025-08-26 N/A 7.5 HIGH
D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formLanguageChange function via the nextPage parameter.
CVE-2025-55602 1 Dlink 2 Dir-619l, Dir-619l Firmware 2025-08-26 N/A 7.5 HIGH
D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formSysCmd function via the submit-url parameter.
CVE-2025-55599 1 Dlink 2 Dir-619l, Dir-619l Firmware 2025-08-26 N/A 7.5 HIGH
D-Link DIR-619L 2.06B01 is vulnerable to Buffer Overflow in the formWlanSetup function via the parameter f_wds_wepKey.
CVE-2025-8956 1 Dlink 2 Dir-818l, Dir-818l Firmware 2025-08-18 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in D-Link DIR‑818L up to 1.05B01. This issue affects the function getenv of the file /htdocs/cgibin of the component ssdpcgi. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-9026 1 Dlink 2 Dir-860l, Dir-860l Firmware 2025-08-18 7.5 HIGH 7.3 HIGH
A vulnerability was identified in D-Link DIR-860L 2.04.B04. This affects the function ssdpcgi_main of the file htdocs/cgibin of the component Simple Service Discovery Protocol. The manipulation leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-8949 1 Dlink 2 Dir-825, Dir-825 Firmware 2025-08-18 8.3 HIGH 7.2 HIGH
A vulnerability was identified in D-Link DIR-825 2.10. Affected by this vulnerability is the function get_ping_app_stat of the file ping_response.cgi of the component httpd. The manipulation of the argument ping_ipaddr leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-7911 1 Dlink 2 Di-8100, Di-8100 Firmware 2025-08-08 9.0 HIGH 8.8 HIGH
A vulnerability classified as critical was found in D-Link DI-8100 1.0. This vulnerability affects the function sprintf of the file /upnp_ctrl.asp of the component jhttpd. The manipulation of the argument remove_ext_proto/remove_ext_port leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2023-44414 1 Dlink 1 D-view 8 2025-08-07 N/A 9.8 CRITICAL
D-Link D-View coreservice_action_script Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability. The specific flaw exists within the coreservice_action_script action. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-19573.