-
DAP-2660 :: H/W Rev. Ax :: F/W v1.13 :: All Models :; All Revisions :: End-of-Life / End-of-Service-Life :: CVE-2023-39749 / CVE-2023-39750 :: buffer overflow vulnerabilities
-
DIR-505 :: H/W Rev. Ax :: F/W v1.09b02 :: All Models :: All Revisions :: End-of-Life / End-of-Service-Life :: Memory Corruption Vulnerability
-
(Non-US) DAR-7000 / (Non-US) DAR-8000 :: All Models :; All Revisions :: End-of-Life / End-of-Service Life :: Multiple Report Vulnerabilities
-
(Non-US) D-View 8 : v2.0.1.28 and below : CVE-2023-5074 : Hard-coded JWT Key Authentication Bypass (Also See 2nd Reference)
-
(Non-US) D-View 8 : v2.0.1.27 and below : TrendMicro (ZDI) Reported Multiple Vulnerabilities
-
(non-US) DIR-846 :: All H/W Revision :: All F/W Version :: End-of-Life / End-of-Service :: Accused of Security Vulnerability
-
DAP-1325 - :: Rev. Ax :: FW v1.07b01 :: ZDI Trendmicro Multiple Remote Code Execution
-
DIR-3040 :: H/W Rev. Ax :: F/W v120B03 :: Stack-Based Overflow flaw in the prog.cgi that coule elevate to multiple attack vectors
-
(Non-US) :: DAP-2622 :: H/W Rev. Ax :: F/W v1.00 :: ZDI-CAN TrendMicro :: Various Security Vulnerabilities Reported
-
DAP-2610 Rev. Ax / DAP-3662 Rev. A / DAP-2330 Rev. A / COVR-3902-US Rev. A / DIR-842 Rev. C :: Vulnerabilities, Implications, and Recommendation of Cryptographic Security in Device Firmware
-
R15 :: H/W Rev. Ax :: F/W v1.08b02 and lower :: Misconfigured IPv6 may pass traffic from WAN to LAN
-
(non-US) DIR-842v2 :: H/W Rev. Ax :: F/W v1.0.3 :: 2 x Command Injection vulnerabilities
-
Regarding Unit 42 New Mirai Variant Targeting Network Security Devices
-
(Non-US) COVR-X1862 Rev. Ax / COVR-X1863 Rev. Ax :: F/W v1.02 or below :: WPS-PIN-Entry-Mode is susceptible to the WPS Pixie Dust attack
-
DIR-X3260 :: H/W Rev. Ax :: F/W v1.02B02 :: ZDI-CAN-20983:: LAN-Side SOAPAction Command Injection Remote Code Execution (RCE) Vulnerability
-
(non-US) DSL-G256DG :: All H/W Revision :: All F/W Version :: End-of-Life / End-of-Service :: Accused of Security Vulnerability
-
DNS-320 :: Rev. Ax :: FW v2.05b01Beta :: CVE-2020-25506 :: End of Service Life (No Fixes Offered) :: Reported Vulnerability
-
DWL-2600AP (Rev. Ax : F/W 4.2.0.15 and Older) Multiple Command Injection Vulnerabilities in Web-GUI command Interface
-
(Non-US) DAP-2622 :: H/W Rev. Ax :: F/W 1.00 :: CVE-2023-35718 :DDP Change ID Password Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability
-
DWA-171 : H/W Rev. Cx :: F/W MS Windows Driver v3.04b02 Hot-Fix Beta 2 and Below (older) :: Unquoted Service Path Privilege Escalation
-
DIR-825 :: All H/W Revision :: All F/W Version :: End-of-Life / End-of-Service :: Accused of Security Vulnerability
-
DAP-2695:: All H/W Revision :: All F/W Version :: End-of-Life / End-of-Service :: Accused of Security Vulnerability
-
DAP-2330 :: All H/W Revision :: All F/W Version :: End-of-Life / End-of-Service :: Accused of Security Vulnerability
-
DAP-1513 :: All H/W Revision :: All F/W Version :: End-of-Life / End-of-Service :: Accused of Security Vulnerability
-
(Non-US) DIR-2150 :: Rev Ax :: FW v1.05B01 :: Multiple Vulnerabiltiies
-
3rd Party Service End-of-Life Notice :: FACEBOOK WIFI Service will shutdown June 12, 2023 (A Non-D-Link Service)
-
DSR-250 :: H/W Rev. Cx :: F/W v3.17B701C and below :: DMZ-enabled host on device is reachable by other host on LAN during boot sequence till DMZ feature is activated when boot is complete.
-
Security Response :: D-Link information regarding Volt Typhoon Cyberattacks
-
D-Link Product Advisory :: CVE-2020-11134 :: Qualcomm WLAN Chipset Vulnerability Disclosure
-
(Non-US) DIR-806IN :: H/W Rev. A1 :: F/W v1.04 :: XSS and Command Injection Security Vulnerability
-
R15 / M15 / E15 / R12 :: F/W v1.08B01 & Below :: WPS-PIN code Vulnerability reported by Reaver
-
DIR-2640 :: H/W Rev Ax :: F/W v1.11B02 & v1.11B02 Beta01 :: Multiple Vulnerabilities by Trend Micro, the Zero Day Initiative (ZDI)
-
CVE-2022-47522 :: Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues :: IEEE 802.11 WiFi protocol accused of fundamental design flaw.
-
DIR-600 :: All Hardware Revisions :: All Firmware :: End-of-Life (EOL) & End-of-Service (EOS) :: Rev. B5 Accused of Security Vulnerability
-
DIR-456U :: All Hardware Revisions :: All Firmware Revisions :: End-of-Life (EoL) / End-of-Service (EoS) :: Hard-Coded Passwords Security Report
-
DIR-868L :: All Hardware Revisions :: All Firmware Revisions :: End-of-Life (EoL) / End-of-Service (EoS) :: Stack-Based Overflow Security Report
-
(non-US) DAP-1360 Rev. F1 & (non-US) DAP-2020 Rev. A2 :: Multiple vulnerabilities by ZDI at TrendMicro
-
(Non-US) DIR-825/EE : H/W Rev. R2 & DIR-825/AC Rev. G1A:: F/W 1.0.9 :: Multiple Vulnerabilities by Trend Micro, the Zero Day Initiative (ZDI)
-
DIR-3040 :: H/W Rev. Ax :: F/W v1.20B03 :: Buffer Overflow Remote Code Execution
-
(Non-US) DWR-956 :: All A Revisions :: All F/W Versions :: :: End of Life (EoL) / End of Service Life (EoS) :: Information Disclosure & Authenticated Command Bypass Vulnerability
-
(Non-US) DSL-224 :: F/W v3.0.8 :: Command Injection can elevate to ROOT access
-
DGS-3630 Series Switches :: Firmware Update with Complete RFC5961 for mitigation of CVE-2004-0230 TCP Denial of Service Vulnerability
-
Non-US :: DVG-G5402SP :: All H/W Revisions :: All F/W Versions :: End-of-Life/End-of-Service: CVE-2022-44928 Command Injection & CVE-2022-44929 Unauthenticated ACL to escalted priviledges
-
DHP-W310AV & DHP-W311AV :: All Hardware Revisions :: All Firmware Versions :: Command Injection Vulnerability
-
DNR-322L :: All H/W Revisions :: All Firmware :: End of Life (EoL) / End of Service Life (EoS) :: Authenticated Command Bypass Vulnerability
-
(Non-US) DIR-825 :: H/W Rev Rx :: F/W v1.33.0.44ebdd4-embedded1.33.0.44ebdd4-embedded :: Buffer Overflow Vulnerability
-
DIR-1260 :: Rev. Ax :: F/W v1.20B05 :: LAN-Side Unauthenticated Command Injection
-
R15 / M15 :: H/W Rev. Ax :: F/W v1.06.07 : Wi-Fi Access Point : Open DNS Resolver Vulnerability
-
DIR-878 :: Rev Ax :: FW v1.30B08 Hotfix_04 :: Command Injection vulnerability via the component /bin/proc.cgi.
-
D-Link WiFI Devcies :: Latest Response for WiFi "FragAttacks" (fragmentation and aggregation attacks) Vulnerability Disclosure...
-
DAP-1513 / DIR-601 / DIR-825 :: All Revisions :: All Firmware Versions :: End-of-Life (EOL) / End-of-Service (EOS) :: Multiple Vulnerabilities Reported
-
DVG-G5402SP :: All Revisions :: All Firmware :: End-of-Life (EOL) / End-of-Service :: 05/21/2012 :: Multiple Vulnerabilities Reported
-
(Non-US) DIR-1935 : Rev. Ax : F/W v1.03b02 :: Multiple Vulnerabilities
-
DNR-322L :: All H/W Revisions :: All Firmware :: End of Life (EoL) / End of Service Life (EoS) :: Authenticated Remote Code Execution (RCE) Vulnerability
-
(Non-US) DWR-118, (Non-US) DWR-921, (Non-US) DWR-925 :: All Revisions :: All Firmware :: End-of-Life (EoL) / End-of-Service (EoS) :: Lan-Side Unauthenticated Credential Disclosure to Elevated Root Access
-
DIR-867 Rev A1 FW v1.30B07 / DIR-878 Rev. A1 FW v1.30B08 / DIR-882-US Rev A1 FW v1.30B08 : CVE-2022-41140 :: LAN-Side Lighttpd Unauthenticated Buffer Overflow & RCE Vulnerability
-
(Non-US) GO-RT-AC750 :: All H/W Revisions :: All F/W Versions :: End-of-Life (EoL) / End-of-Service (EoS) :: Multiple Vulnerabilities
-
(Non-US) DIR-845 & DAP-1522:: All H/W Revisions :: All F/W Versions :: End-of-Life (EOL) / End-Of-Service (EOS) :: Multiple Vulnerabilities
-
Legacy (older) D-Link Routers :: All Revision :: All Firmware :: Mirai Variant MooBot Disclosure :: End of Life (EoL) / End of Service (EoS)
-
DIR-878 :: Rev. Ax :: FW v1.30B08 :: Authenticated Command Injection
-
(Non-US) DIR-2150 :: Rev Rx :: FW v4.0.1 :: Multiple Vulnerabiltiies
-
(Non-US Revisions) DIR-612 / 615 / 822 :: CVE-2022-27255 :: Realtek Device eCOS RTL819x Chipset Family Software has a Stack-Based Buffer Overflow Vulnerability
-
DIR-860L Rev. Ax, DIR-865L Rev. Ax, DIR-868L Rev. Ax., and DIR-880L Rev Ax. :: XSS vulnerabilities and Unauthenticated Command Injection Vulnerability
-
Mozi P2P Botnet :: Accused Product Firmware Patches :: Command Execution and UPnP Security Vulnerabilities
-
DIR-645: :: All H/W Revisions :: All Firmware Versions :: End of Support / End of Life Product :: CVE-2022-32092 :: (LAN-Side) RCE in Web-Configuration Engine
-
DIR-890L/R / DIR-885L/R / DIR-895L/R :: All Revisions :: All Firmware :: End-of-Life / End-of-Service :: Multiple Vulnerabilities
-
DIR-816L :: Alll Revisions :: All Firmware :: End of Support / End of Life Product :: CVE-2022-28955 - CVE-2022-28956 - CVE-2022-28958
-
Regarding Industry-Wide Security Incident :: DNS poisoning flaw due to the use of legacy version of uClibc
-
DIR-615 :: Alll Revisions :: All Firmware :: End of Support / End of Life Product :: PCB UART Header Exploit
-
DIR-820L :: Alll Revisions :: All Firmware :: End of Support / End of Life Product :: CVE-2022-26258
-
DIR-878 :: H/W Rev. Ax :: F/W v1.30B08_Hotfix_02 :: CVE-2021-44880 & CVE-2021-44882 :: Multiple Vulnerabilities
-
DIR-878 :: H/W Rev. Ax :: F/W v1.20b05 :: Authenticated LAN-side Remote Code Execution (RCE) Vulnerability
-
(non-US) DIR-816 :: Alll Revisions :: All Firmware :: End of Support / End of Life Product :: Multiple Security Vulnerabilities (inc. CVE-2021-31326)
-
(Non-US) DIR-825 :: H/W Rev. Gx :: F/W v.7.xx :: Authentication Bypsss and an Authorized Remote Command Execution (RCE)
-
DIR-878.:: H/W Rev. A1 :: F/W vFW1.30B08_Hotfix_02:: Command Injection Vulnerabilities
-
(Non-US) DIR-X1860 :: Rev A1 :: F/W v1.03 :: multiple vulnerabilities
-
D-Link Remains Unaffected by the Russia-Ukraine Crisis
-
MediaTek Wi-Fi WPS/IEEE-1905 Vulnerabilities:BadMesher & Authentication Flooding
-
DIR-882 & DIR-882-US :: H/W Rev. Ax :: F/W v1.30B06_Hotfix_02 :: CVE-2021-44880, CVE-2021-44881, & CVE-2021-45998 :: Multiple Vulnerabilities
-
(Non-US) DIR-823-Pro :: H/W Rev. Ax :: F/W v1.0.2 :: CVE-2021-46452 thru CVE-2021-46457 :: Multiple Vulnerabilities
-
(Non-US) DI-7200GV2.:: H/W Rev. E1 :: F/W v21.04.09E1 :: CVE-2021-46226 thru CVE-2021-46233 :: Multiple Vulnerability
-
(Non-US) DSL-2730U :: Rev. V1 :: F/W vIN_1.11 ::Multiple Vulnerabilities
-
Multiple Legacy Device (Older generation DIR & DAP Models) :: All H/W Revs. :: All Firmware Versions :: End of Support / End of Life Product :: CVE-2019-10891 CVE-2015-2051 Command Execution Vulnerability
-
(Non-US) DSL-2750U :: Rev V1 :: F/W vIN_1.09 :: Multiple Vulnerabilities
-
DAP-2553 :: Rev. Ax :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerability
-
D-Link Device Information for CVE-2021-45608 :: KCodes NetUSB RCE Vulnerability
-
DIR-645: :: All H/W Revisions :: All Firmware Versions :: End of Support / End of Life Product :: Liquorbot Crypto-mining Botnet
-
DIR-850L:: All H/W Revisions :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerability
-
DCM-200 / DCM-201 / DCM-202 / DCM-301 Cable Modems :: All H/W Revisions :: All Firmware Versions :: End of Support / End of Life Product :: Not Affected by Cable-Haunt Vulnerability
-
DIR-X5460 :: H/W Rev. Ax :: F/W v1.10b10 :: Multiple Vulnerability reported by IoT Inspector
-
DIR-506L / DIR-510L / DIR-640L / (Non-US) DWR-113 / (Non-US) DWR-116 / (Non-US) DWR-512:: All H/W Revisions :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerability
-
(Non-US) DSP-W245 :: All H/W Revisions :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerability
-
DAP-1522 / DAP-1525 / DHP-W310AV / DIR-412 :: All H/W Revisions :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerability
-
DCS-1100 / DCS-1130 / DCS-6045 :: All H/W Revisions :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerability
-
DIR-850L:: All H/W Revisions :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerability
-
DIR-X1560 : Rev Ax : FW v1.04B04 / (non-US) DIR-X6060 : Rev Ax : FW v1.11B04 :: Chipset Patches required to mitigate WPA3-SAE & WPA2 attacks
-
(non-US Models/Revisions) DIR-600M DIR-612 DIR-615 DSL-2750U Windows WPAD 'domain.name' attack
-
DIR-859:: All H/W Revisions :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerability
-
DAP-1650 :: All H/W Revisions :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerability
-
(non-US) DIR-842 :: H/W Rev. A1/A2/B1/B2 :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerability