• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10433
(non-US) DIR-816: All Hardware Revisions / All Firmware Versions : End-of-Life (EoL) / End-of-Service (EoL) Lifecycle : Vulnerabilitiies Reported
Publication ID: SAP10433
Resolved Status: Yes
Published on: 26 June 2025 8:41 GMT
Last updated on: 26 June 2025 8:41 GMT

Overview  

 

The (non-US) DIR-816, all hardware revisions and firmware versions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle.  The product have been identified as having multiple vulnerabilities.

 

D-Link Corporation and D-Link North America (D-Link Systems, Inc.) recommend that all current users take one or more of the following actions:

1.             Transition to a current-generation product that has active firmware development and customer support.

2.             Perform comprehensive data backup.

3.             Contact our local regional office for further recommendations or information (LINK). 

 

By standard industry practice, products that have reached EOL/EOS status may no longer receive technical support or firmware updates. Please read the detailed information and recommendations provided below.

 

3rd Party Report information   

Report 1: (06/05/2025) 

            Author(s):

pjqwudi – VULdb Disclosure

 

Disclosure:  CVE-2025-5622 : (Link) : D-Link DIR-816 wirelessApcli_5g stack-based overflow
Description: A vulnerability was found in D-Link DIR-816 1.10CNB05 and classified as critical. This issue affects the function wirelessApcli_5g in the file /goform/wirelessApcli_5g. The manipulation of the argument apcli_mode_5g/apcli_enc_5g/apcli_default_key_5g leads to a stack-based buffer overflow.

         CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

         CVSS:

Score

Severity

Version

Vector String

9.3

CRITICAL

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

9.8

CRITICAL

3.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8

CRITICAL

3.0

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10.0

2.0

AV:N/AC:L/Au:N/C:C/I:C/A:C

             Affected: All models, Derivative Models, All Revisions, and All Firmware

 

 

 

Report 2: (06/05/2025) 

        Author(s):

pjqwudi – VULdb Disclosure

 

Disclosure:  CVE-2025-5623 : (Link) : D-Link DIR-816 qosClassifier stack-based overflow
Description: A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to stack-based buffer overflow.

         CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

         CVSS:

Score

Severity

Version

Vector String

9.3

CRITICAL

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

9.8

CRITICAL

3.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8

CRITICAL

3.0

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10.0

2.0

AV:N/AC:L/Au:N/C:C/I:C/A:C

             Affected: All models, Derivative Models, All Revisions, and All Firmware

 

Report 3: (06/05/2025) 

        Author(s):

pjqwudi – VULdb Disclosure

 

Disclosure:  CVE-2025-5624 : (Link) : D-Link DIR-816 QoSPortSetup stack-based overflow
Description: A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to a stack-based buffer overflow.

         CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

         CVSS:

Score

Severity

Version

Vector String

9.3

CRITICAL

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

9.8

CRITICAL

3.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8

CRITICAL

3.0

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10.0

2.0

AV:N/AC:L/Au:N/C:C/I:C/A:C

              Affected: All models, Derivative Models, All Revisions, and All Firmware

 

 

Report 4: (06/05/2025) 

        Author(s):

pjqwudi – VULdb Disclosure

 

Disclosure:  CVE-2025-5630 : (Link) : D-Link DIR-816 form2lansetup.cgi stack-based overflow
Description: A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. This vulnerability affects unknown code of the file /goform/form2lansetup.cgi. The manipulation of the argument IP leads to a stack-based buffer overflow.

         CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption

         CVSS:

Score

Severity

Version

Vector String

9.3

CRITICAL

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

9.8

CRITICAL

3.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8

CRITICAL

3.0

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10.0

2.0

AV:N/AC:L/Au:N/C:C/I:C/A:C

             Affected: All models, Derivative Models, All Revisions, and All Firmware

 

 

Report 5: (06/04/2025) 

        Author(s):

pjqwudi – VULdb Disclosure

 

Disclosure:  CVE-2025-5620 : (Link) : D-Link DIR-816 setipsec_config os command injection

Description: A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection.

         CWE: CWE-78: OS Command Injection /CWE-77: Command Injection

         CVSS:

Score

Severity

Version

Vector String

6.9

MEDIUM

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

7.3

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7.3

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7.5

2.0

AV:N/AC:L/Au:N/C:P/I:P/A:P

             Affected: All models, Derivative Models, All Revisions, and All Firmware

 

 

Report 6: (06/04/2025) 

        Author(s):

pjqwudi – VULdb Disclosure

 

Disclosure:  CVE-2025-5621 : (Link) : D-Link DIR-816 qosClassifier os command injection

Description: A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this vulnerability is the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to os command injection.

CWE: CWE-78: OS Command Injection /CWE-77: Command Injection

         CVSS:

Score

Severity

Version

Vector String

6.9

MEDIUM

4.0

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

7.3

HIGH

3.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7.3

HIGH

3.0

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7.5

2.0

AV:N/AC:L/Au:N/C:P/I:P/A:P

Affected: All models, Derivative Models, All Revisions, and All Firmware

 

Affected Models

Model

Rev

Region

Accused firmware

EOL/EOS

Recommendation

 Last Updated

DIR-816

All

Worldwide

None Known

11/10/23

Retire and Replace

06/26/2025

 

Recommendation for End of Support /End of Life Products

From time to time, D-Link will determine that some of its products have reached the End of Support ("EOS") or End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to the evolution of technology, market demands,   innovations, product efficiencies based on new technologies, or the product matures over time. It should be replaced by functionally superior technology.

 

For US Consumer

 

If a product has reached its End of Support ("EOS") and End of Life ("EOL"), there is usually no further extended support or development available for it.

 

Typically, for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support have ceased. 

 

D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please ensure the device has the most recent firmware, frequently update the device's unique password to access its web configuration, and always enable Wi-Fi encryption with a unique password.