D-Link

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any D-Link product.

RSS Feeds for D-Link security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in D-Link products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by D-Link Sorted by Most Security Vulnerabilities since 2018

 

D-Link Dap 2622 Firmware54 vulnerabilities

 

D-Link Dir 619l Firmware44 vulnerabilities

 

D-Link Dir 605l Firmware41 vulnerabilities

 

D-Link Dap 1325 Firmware37 vulnerabilities

 

D-Link Dir 816 Firmware33 vulnerabilities

 

D-Link Dir 823g Firmware29 vulnerabilities

 

D-Link Dir X3260 Firmware23 vulnerabilities

 

D-Link Dwr M96022 vulnerabilities

 

D-Link G416 Firmware21 vulnerabilities

 

D-Link D View 819 vulnerabilities

 

D-Link Di 8100 Firmware17 vulnerabilities

 

D-Link Dir 3040 Firmware17 vulnerabilities

 

D-Link Dar 7000 Firmware14 vulnerabilities

 

D-Link Dwr M92014 vulnerabilities

 

D-Link Di 7003g Firmware12 vulnerabilities

 

D-Link Go Rt Ac750 Firmware11 vulnerabilities

 

D-Link Dir 878 Firmware10 vulnerabilities

 

D-Link Dir 882 A1 Firmware10 vulnerabilities

 

D-Link Dir 2150 Firmware10 vulnerabilities

 

D-Link Dir 600l Firmware9 vulnerabilities

 

D-Link Dsl 3782 Firmware9 vulnerabilities

 

D-Link Dir 823x Firmware9 vulnerabilities

 

D-Link Dir 2640 Firmware8 vulnerabilities

 

D-Link Dir 822k8 vulnerabilities

 

D-Link Dcs 932l Firmware7 vulnerabilities

 

D-Link Di 8003 Firmware7 vulnerabilities

 

D-Link Dsl6740c Firmware7 vulnerabilities

 

D-Link Dir 853 Firmware7 vulnerabilities

 

D-Link Dcs 8300lhv2 Firmware6 vulnerabilities

 

D-Link Dwr M9216 vulnerabilities

 

D-Link Dir 513 Firmware6 vulnerabilities

 

D-Link Dir 820l Firmware6 vulnerabilities

 

D-Link Dir 822 Firmware6 vulnerabilities

 

D-Link Dir 825 Firmware6 vulnerabilities

 

D-Link Dir 845l Firmware6 vulnerabilities

 

D-Link Dir 846 Firmware6 vulnerabilities

 

D-Link Dwl 6610ap Firmware5 vulnerabilities

 

D-Link Dir 882 Firmware5 vulnerabilities

 

D-Link Dir 6005 vulnerabilities

 

D-Link Dir 816 A2 Firmware5 vulnerabilities

 

D-Link Nuclias Connect4 vulnerabilities

 

D-Link Dap 1520 Firmware4 vulnerabilities

 

D-Link Dap 1620 Firmware4 vulnerabilities

 

D-Link Dns 320 Firmware4 vulnerabilities

 

D-Link Dir 868l Firmware4 vulnerabilities

 

D-Link Di 8100g Firmware4 vulnerabilities

 

D-Link Di 8200 Firmware4 vulnerabilities

 

D-Link Dir 645 Firmware4 vulnerabilities

 

D-Link Dir 846w Firmware4 vulnerabilities

 

D-Link Dap 2695 Firmware3 vulnerabilities

 

D-Link Dar 8000 Firmware3 vulnerabilities

 

D-Link Dir X4860 Firmware3 vulnerabilities

 

D-Link Dir 890l Firmware3 vulnerabilities

 

D-Link Di 7300g Firmware3 vulnerabilities

 

D-Link Dir 1003 vulnerabilities

 

D-Link Dir 600 Firmware3 vulnerabilities

 

D-Link Dir 632 Firmware3 vulnerabilities

 

D-Link Dir 860l Firmware3 vulnerabilities

 

D-Link Dir 815 Firmware3 vulnerabilities

 

D-Link Dir 816l3 vulnerabilities

 

D-Link Dwr 2000m Firmware3 vulnerabilities

 

D-Link Dir 825m3 vulnerabilities

 

D-Link Dap 1320 Firmware2 vulnerabilities

 

D-Link Dap 1562 Firmware2 vulnerabilities

 

D-Link Dsl 225 Firmware2 vulnerabilities

 

D-Link Dap 26952 vulnerabilities

 

D-Link Dsp W215 Firmware2 vulnerabilities

 

D-Link Dsl 2740r Firmware2 vulnerabilities

 

D-Link Dcs 960l Firmware2 vulnerabilities

 

D-Link Dhp W310av Firmware2 vulnerabilities

 

D-Link Dsl 224 Firmware2 vulnerabilities

 

D-Link Di 8004w Firmware2 vulnerabilities

 

D-Link Di 8300 Firmware2 vulnerabilities

 

D-Link Di 8400 Firmware2 vulnerabilities

 

D-Link Dir 300 Firmware2 vulnerabilities

 

D-Link Dir 867 Firmware2 vulnerabilities

 

D-Link Dns 325 Firmware2 vulnerabilities

 

D-Link Dir 610 Firmware2 vulnerabilities

 

D-Link Dns 320l Firmware2 vulnerabilities

 

D-Link Dir878 Firmware2 vulnerabilities

 

D-Link Dir 6452 vulnerabilities

 

D-Link Dsl 2750u Firmware2 vulnerabilities

 

D-Link Dns 340l Firmware2 vulnerabilities

 

D-Link Dwl 2600ap Firmware2 vulnerabilities

 

D-Link Dsl 6740c Firmware2 vulnerabilities

 

D-Link Dns 327l Firmware2 vulnerabilities

 

D-Link Dir 859 Firmware2 vulnerabilities

 

D-Link Dir 832x Firmware2 vulnerabilities

 

D-Link Dir 842v2 Firmware2 vulnerabilities

 
 

D-Link Dcs 7517 Firmware1 vulnerability

 

D-Link Dcs 930l Firmware1 vulnerability

 

D-Link Dir 1101 vulnerability

 

D-Link Dir 1950 Firmware1 vulnerability

 

D-Link Dir 1960 Firmware1 vulnerability

By the Year

In 2026 there have been 102 vulnerabilities in D-Link with an average score of 7.2 out of ten. Last year, in 2025 D-Link had 240 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in D-Link in 2026 could surpass last years number. Last year, the average CVE base score was greater by 0.93




Year Vulnerabilities Average Score
2026 102 7.21
2025 240 8.14
2024 347 8.49
2023 85 9.01
2022 39 9.05
2021 10 8.60
2020 11 8.00
2019 7 9.57
2018 5 7.70

It may take a day or so for new D-Link vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent D-Link Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-5312 Apr 01, 2026
Improper Access Control in D-Link DNS via /cgi-bin/dsk_mgr.cgi A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected by this vulnerability is the function FMT_restart/Status_HDInfo/SMART_List/ScanDisk_info/ScanDisk/volume_status/Get_Volume_Mapping/FMT_check_disk_remount_state/FMT_rebuildinfo/FMT_result_list/FMT_result_list_phy/FMT_get_dminfo/FMT_manually_rebuild_info/Get_current_raidtype of the file /cgi-bin/dsk_mgr.cgi. Executing a manipulation can lead to improper access controls. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
CVE-2026-5311 Apr 01, 2026
D-Link WebDAV cmd Argument Manipulation Enables ACL Bypass A security flaw has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected is the function Webdav_Access_List of the file /cgi-bin/file_center.cgi. Performing a manipulation of the argument cmd results in improper access controls. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
CVE-2026-5215 Mar 31, 2026
D-Link DNS Series Improper Access Control in cgi_get_ipv6 A vulnerability was identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The impacted element is the function cgi_get_ipv6 of the file /cgi-bin/network_mgr.cgi. Such manipulation leads to improper access controls. The exploit is publicly available and might be used.
CVE-2026-5214 Mar 31, 2026
Remote Stack Buffer Overflow in D-Link DNS Router Account Manager CGI A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Impacted is the function cgi_addgroup_get_group_quota_minsize of the file /cgi-bin/account_mgr.cgi. The manipulation of the argument Name results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
CVE-2026-5213 Mar 31, 2026
Stack Buffer Overflow in D-Link DNS Router cgi_adduser_to_session A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The affected element is the function cgi_adduser_to_session of the file /cgi-bin/account_mgr.cgi. This manipulation of the argument read_list causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
CVE-2026-5212 Mar 31, 2026
Stack Buffer Overflow in D-Link DNS Router Webdav_Upload_File A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This issue affects the function Webdav_Upload_File of the file /cgi-bin/webdav_mgr.cgi. The manipulation of the argument f_file leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
CVE-2026-5211 Mar 31, 2026
Stack-Based Buffer Overflow in D-Link DNS Router UPnP AV Server A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This vulnerability affects the function UPnP_AV_Server_Path_Del of the file /cgi-bin/app_mgr.cgi. Executing a manipulation of the argument f_dir can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.
CVE-2026-5024 Mar 29, 2026
D-Link DIR-513 1.10 SSB in formSetEmail via curTime (remote) A vulnerability was found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4627 Mar 24, 2026
D-Link DIR-825/825R OS Command Injection in NTP Service (v4.5.1) A vulnerability was found in D-Link DIR-825 and DIR-825R 1.0.5/4.5.1. Affected is the function handler_update_system_time of the file libdeuteron_modules.so of the component NTP Service. The manipulation results in os command injection. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4555 Mar 22, 2026
D-Link DIR-513 1.10 Stack Buffer Overflow in boa's formEasySetTimezone (curTime) A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasySetTimezone of the file /goform/formEasySetTimezone of the component boa. This manipulation of the argument curTime causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4529 Mar 21, 2026
D-Link DHP-1320 1.00WWB04 SOAP Handler Stack Buffer Overflow Remote Exploit A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4499 Mar 20, 2026
D-Link DIR-820LW 2.03 SSDP cmd injection via ssdpcgi_main A vulnerability was determined in D-Link DIR-820LW 2.03. Affected is the function ssdpcgi_main of the component SSDP. Executing a manipulation can lead to os command injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
CVE-2026-4486 Mar 20, 2026
Stack overflow in D-Link DIR-513 1.10 Web Service (formEasySetPassword) A vulnerability was found in D-Link DIR-513 1.10. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4465 Mar 20, 2026
D-Link DIR-513 1.10 OS Command Injection via /goform/formSysCmd A flaw has been found in D-Link DIR-513 1.10. The impacted element is an unknown function of the file /goform/formSysCmd. Executing a manipulation of the argument sysCmd can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4214 Mar 16, 2026
Stack Buffer Overflow in D-Link DNS UPnP AV Server Path Setting A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This issue affects the function UPnP_AV_Server_Path_Setting of the file /cgi-bin/app_mgr.cgi. Executing a manipulation can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
CVE-2026-4213 Mar 16, 2026
Stack Buffer Overflow in D-Link DNS Router cgi_myfavorite CGI A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This vulnerability affects the function cgi_myfavorite_del_user/cgi_myfavorite_verify of the file /cgi-bin/gui_mgr.cgi. Performing a manipulation results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
CVE-2026-4212 Mar 16, 2026
D-Link DNS-120 Series Stack-Buffer Overflow via Downloads_Schedule_Info A security vulnerability has been detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This affects the function Downloads_Schedule_Info of the file /cgi-bin/download_mgr.cgi. Such manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
CVE-2026-4211 Mar 16, 2026
D-Link DNS Series Buffer Overflow via Local_Backup_Info A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected by this issue is the function Local_Backup_Info of the file /cgi-bin/local_backup_mgr.cgi. This manipulation of the argument f_idx causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
CVE-2026-4210 Mar 16, 2026
CGI Command Injection in D-Link DNS Routers (CVE-2026-4210) A security flaw has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected by this vulnerability is the function cgi_tm_set_share of the file /cgi-bin/time_machine.cgi. The manipulation of the argument Name results in command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.
CVE-2026-4209 Mar 16, 2026
D-Link DNS Series Command Injection via /cgi-bin/account_mgr CGI A vulnerability was identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected is the function cgi_create_import_users/cgi_user_batch_create/cgi_user_set_quota/cgi_user_del/cgi_user_modify/cgi_group_set_quota/cgi_group_modify/cgi_group_add/cgi_user_add/cgi_get_modify_group_info/cgi_chg_admin_pw of the file /cgi-bin/account_mgr.cgi. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
CVE-2026-4207 Mar 16, 2026
Command Injection in D-Link DNS-120 Router cgi via System Manager CGI A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This impacts the function cgi_device/cgi_sms_test/cgi_firmware_upload/cgi_ntp_time of the file /cgi-bin/system_mgr.cgi. Executing a manipulation can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
CVE-2026-4206 Mar 16, 2026
D-Link DNS Router Command Injection via /cgi-bin/dsk_mgr.cgi A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This affects the function FMT_rebuild_diskmgr/FMT_create_diskmgr/ScanDisk_run_e2fsck of the file /cgi-bin/dsk_mgr.cgi. Performing a manipulation results in command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
CVE-2026-4205 Mar 16, 2026
D-Link DNS Series Command Injection via /cgi-bin/App_Mgr.cgi (FTP_BlockIP) A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The impacted element is the function cgi_refresh_db/FTP_Server_BlockIP_Add/FTP_Server_BlockIP_Del of the file /cgi-bin/app_mgr.cgi. Such manipulation leads to command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
CVE-2026-4204 Mar 16, 2026
D-Link DNS Series Cmd Injection via CGI f_user A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The affected element is the function cgi_myfavorite_add/cgi_myfavorite_set/cgi_myfavorite_del/cgi_myfavorite_set_sort_info/cgi_myfavorite_remove_apkg/cgi_myfavorite_compare_apkg/cgi_mycloud_auto_downlaod of the file /cgi-bin/gui_mgr.cgi. This manipulation of the argument f_user causes command injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
CVE-2026-4203 Mar 16, 2026
Command Injection in D-Link Router CGI (DNS Series) A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Impacted is the function cgi_portforwarding_add/cgi_portforwarding_del/cgi_portforwarding_modify/cgi_portforwarding_add_scan/cgi_dhcpd_lease/cgi_ddns/cgi_ip/cgi_dhcpd of the file /cgi-bin/network_mgr.cgi. The manipulation results in command injection. The attack may be launched remotely. The exploit is now public and may be used.
CVE-2026-4197 Mar 15, 2026
D-Link DNS Router Command Injection via download_mgr.cgi A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected is the function RSS_Get_Update_Status/RSS_Update/RSS_Channel_AutoDownlaod/RSS_Add/RSS_Channel_Item_Downlaod/RSS_History_Item_List/RSS_Item_List of the file /cgi-bin/download_mgr.cgi. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.
CVE-2026-4196 Mar 15, 2026
D-Link DNS Series: Remote Command Injection via /cgi-bin/remote_backup.cgi A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This impacts the function cgi_recovery/cgi_backup_now/cgi_set_schedule/cgi_set_rsync_server of the file /cgi-bin/remote_backup.cgi. The manipulation leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
CVE-2026-4195 Mar 15, 2026
Command Injection in D-Link DNS series via /cgi-bin/wizard_mgr.cgi A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This affects an unknown function of the file /cgi-bin/wizard_mgr.cgi. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used.
CVE-2026-4194 Mar 15, 2026
D-Link DNS Series Remote Access Control Bypass via cgi_set_wto A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The impacted element is the function cgi_set_wto of the file /cgi-bin/system_mgr.cgi. Performing a manipulation results in improper access controls. Remote exploitation of the attack is possible. The exploit is now public and may be used.
CVE-2026-4193 Mar 15, 2026
D-Link DIR-823G 1.0.2B05 goahead Improper Access Control (CVE-2026-4193) A security vulnerability has been detected in D-Link DIR-823G 1.0.2B05. The affected element is the function GetDDNSSettings/GetDeviceDomainName/GetDeviceSettings/GetDMZSettings/GetFirewallSettings/GetGuestNetworkSettings/GetLanWanConflictInfo/GetLocalMacAddress/GetNetworkSettings/GetQoSSettings/GetRouterInformationSettings/GetRouterLanSettings/GetWanSettings/SetAccessCtlList/SetAccessCtlSwitch/SetDeviceSettings/SetGuestWLanSettings/SetIPv4FirewallSettings/SetNetworkSettings/SetNetworkTomographySettings/SetNTPServerSettings/SetRouterLanSettings/SetStaticClientInfo/SetStaticRouteSettings/SetWLanRadioSecurity/SetWPSSettings/UpdateClientInfo of the component goahead. Such manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4188 Mar 15, 2026
D-Link DIR-619L 2.06B01: boa formSchedule curTime Stack Overflow A security flaw has been discovered in D-Link DIR-619L 2.06B01. The affected element is the function formSchedule of the file /goform/formSchedule of the component boa. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4184 Mar 15, 2026
D-Link DIR-816 1.10CNB05: goahead /goform/form2Wl5BasicSetup.cgi psk BUFOVF A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi of the component goahead. Performing a manipulation of the argument pskValue results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4183 Mar 15, 2026
D-Link DIR-816 1.10CNB05 stack-based BOF via goahead pskValue A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4182 Mar 15, 2026
Remote RCE via Buffer Overflow in D-Link DIR-816 1.10CNB05 goahead A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4181 Mar 15, 2026
D-Link DIR-816 1.10CNB05: stack bof in form2RepeaterStep2.cgi A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-4180 Mar 15, 2026
D-Link DIR-816 1.10CNB05 Improper Access via redirect.asp A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-3978 Mar 12, 2026
Stack Buffer Overflow in D-Link DIR-513 v1.10 via /goform/formEasySetupWizard3 A vulnerability was detected in D-Link DIR-513 1.10. The impacted element is an unknown function of the file /goform/formEasySetupWizard3. The manipulation of the argument wan_connected results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.
CVE-2026-3485 Mar 03, 2026
OS Command Injection via SSDP ST Arg in D-Link DIR-868L A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1BF84 of the component SSDP Service. This manipulation of the argument ST causes os command injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-2962 Feb 23, 2026
D-Link DWR-M960 1.01.07 Scheduled Reboot Endpoint Stack BFOver A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
Dwr M960
CVE-2026-2961 Feb 23, 2026
Stack Overflow in D-Link DWR-M960 1.01.07 VPN Config Endpoint via submit-url A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Dwr M960
CVE-2026-2960 Feb 23, 2026
D-Link DWR-M960 1.01.07: stack buffer overflow via submit-url A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.
Dwr M960
CVE-2026-2959 Feb 22, 2026
D-Link DWR-M960 1.01.07 Buffer Overflow via formNewSchedule Modifiable URL A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.
Dwr M960
CVE-2026-2958 Feb 22, 2026
D-Link DWR-M960 1.01.07 stack-based buffer overflow in sub_457C5C (remote) A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Dwr M960
CVE-2026-2929 Feb 22, 2026
D-Link DWR-M960 1.01.07 WAC Endpoint Bof via submit-url A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_453140 of the file /boafrm/formWlAc of the component Wireless Access Control Endpoint. This manipulation of the argument submit-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
Dwr M960
CVE-2026-2928 Feb 22, 2026
D-Link DWR-M960 1.01.07 WLAN Encryption Config Endpoint Stack Overflow A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Dwr M960
CVE-2026-2927 Feb 22, 2026
Stack-based buffer overflow in D-Link DWR-M960 1.01.07 OpMode Cfg A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Dwr M960
CVE-2026-2926 Feb 22, 2026
D-Link DWR-M960 1.01.07 LTE Config Stack Buffer Overflow (remote) A flaw has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4237AC of the file /boafrm/formLteSetup of the component LTE Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.
Dwr M960
CVE-2026-2925 Feb 22, 2026
D-Link DWR-M960 1.01.07 Bridge VLAN Buffer Overflow (sub_42B5A0) A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_42B5A0 of the file /boafrm/formBridgeVlan of the component Bridge VLAN Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Dwr M960
CVE-2026-2885 Feb 21, 2026
D-Link DWR-M960 1.01.07 Buffer Overflow: sub_469104 in formIpv6Setup A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
Dwr M960
CVE-2026-2884 Feb 21, 2026
D-Link DWR-M960 1.01.07 WAN Handler Stack Buffer Overflow A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Dwr M960
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.