Overview
The (non-US) DIR-816, all hardware revisions and firmware versions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle. The product have been identified as having multiple vulnerabilities.
D-Link Corporation and D-Link North America (D-Link Systems, Inc.) recommend that all current users take one or more of the following actions:
1. Transition to a current-generation product that has active firmware development and customer support.
2. Perform comprehensive data backup.
3. Contact our local regional office for further recommendations or information (LINK).
By standard industry practice, products that have reached EOL/EOS status may no longer receive technical support or firmware updates. Please read the detailed information and recommendations provided below.
3rd Party Report information
Report 1: (06/05/2025)
Author(s):
pjqwudi – VULdb Disclosure
Disclosure: CVE-2025-5622 : (Link) : D-Link DIR-816 wirelessApcli_5g stack-based overflow
Description: A vulnerability was found in D-Link DIR-816 1.10CNB05 and classified as critical. This issue affects the function wirelessApcli_5g in the file /goform/wirelessApcli_5g. The manipulation of the argument apcli_mode_5g/apcli_enc_5g/apcli_default_key_5g leads to a stack-based buffer overflow.
CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
9.3
|
CRITICAL
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
|
9.8
|
CRITICAL
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
9.8
|
CRITICAL
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
10.0
|
—
|
2.0
|
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
Affected: All models, Derivative Models, All Revisions, and All Firmware
Report 2: (06/05/2025)
Author(s):
pjqwudi – VULdb Disclosure
Disclosure: CVE-2025-5623 : (Link) : D-Link DIR-816 qosClassifier stack-based overflow
Description: A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to stack-based buffer overflow.
CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
9.3
|
CRITICAL
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
|
9.8
|
CRITICAL
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
9.8
|
CRITICAL
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
10.0
|
—
|
2.0
|
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
Affected: All models, Derivative Models, All Revisions, and All Firmware
Report 3: (06/05/2025)
Author(s):
pjqwudi – VULdb Disclosure
Disclosure: CVE-2025-5624 : (Link) : D-Link DIR-816 QoSPortSetup stack-based overflow
Description: A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to a stack-based buffer overflow.
CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
9.3
|
CRITICAL
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
|
9.8
|
CRITICAL
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
9.8
|
CRITICAL
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
10.0
|
—
|
2.0
|
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
Affected: All models, Derivative Models, All Revisions, and All Firmware
Report 4: (06/05/2025)
Author(s):
pjqwudi – VULdb Disclosure
Disclosure: CVE-2025-5630 : (Link) : D-Link DIR-816 form2lansetup.cgi stack-based overflow
Description: A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. This vulnerability affects unknown code of the file /goform/form2lansetup.cgi. The manipulation of the argument IP leads to a stack-based buffer overflow.
CWE: CWE-121: Stack-based Buffer Overflow / CWE-119: Memory Corruption
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
9.3
|
CRITICAL
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
|
9.8
|
CRITICAL
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
9.8
|
CRITICAL
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
10.0
|
—
|
2.0
|
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
Affected: All models, Derivative Models, All Revisions, and All Firmware
Report 5: (06/04/2025)
Author(s):
pjqwudi – VULdb Disclosure
Disclosure: CVE-2025-5620 : (Link) : D-Link DIR-816 setipsec_config os command injection
Description: A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection.
CWE: CWE-78: OS Command Injection /CWE-77: Command Injection
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
6.9
|
MEDIUM
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
|
7.3
|
HIGH
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
7.3
|
HIGH
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
7.5
|
—
|
2.0
|
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
Affected: All models, Derivative Models, All Revisions, and All Firmware
Report 6: (06/04/2025)
Author(s):
pjqwudi – VULdb Disclosure
Disclosure: CVE-2025-5621 : (Link) : D-Link DIR-816 qosClassifier os command injection
Description: A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this vulnerability is the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to os command injection.
CWE: CWE-78: OS Command Injection /CWE-77: Command Injection
CVSS:
Score
|
Severity
|
Version
|
Vector String
|
6.9
|
MEDIUM
|
4.0
|
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
|
7.3
|
HIGH
|
3.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
7.3
|
HIGH
|
3.0
|
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
7.5
|
—
|
2.0
|
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
Affected: All models, Derivative Models, All Revisions, and All Firmware
Affected Models
Model
|
Rev
|
Region
|
Accused firmware
|
EOL/EOS
|
Recommendation
|
Last Updated
|
DIR-816
|
All
|
Worldwide
|
None Known
|
11/10/23
|
Retire and Replace
|
06/26/2025
|
Recommendation for End of Support /End of Life Products
From time to time, D-Link will determine that some of its products have reached the End of Support ("EOS") or End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to the evolution of technology, market demands, innovations, product efficiencies based on new technologies, or the product matures over time. It should be replaced by functionally superior technology.
For US Consumer
If a product has reached its End of Support ("EOS") and End of Life ("EOL"), there is usually no further extended support or development available for it.
Typically, for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support have ceased.
D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please ensure the device has the most recent firmware, frequently update the device's unique password to access its web configuration, and always enable Wi-Fi encryption with a unique password.