D-Link Dir 300 Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in D-Link Dir 300 Firmware.
By the Year
In 2026 there have been 0 vulnerabilities in D-Link Dir 300 Firmware. Last year, in 2025 Dir 300 Firmware had 1 security vulnerability published. Right now, Dir 300 Firmware is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 1 | 0.00 |
| 2024 | 1 | 9.80 |
It may take a day or so for new Dir 300 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent D-Link Dir 300 Firmware Security Vulnerabilities
OS Command Injection (RCE) in D-Link DIR-600/300 rev B (2.14b01/2.13)
CVE-2013-10069
- August 05, 2025
The web interface of multiple D-Link routers, including DIR-600 rev B (2.14b01) and DIR-300 rev B (2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enabling persistent interactive shell access as root.
Shell injection
Hardcoded Telnet Credentials in D-Link DIR-300 REVA v1.06B05_WW
CVE-2024-41616
9.8 - Critical
- August 06, 2024
D-Link DIR-300 REVA FIRMWARE v1.06B05_WW contains hardcoded credentials in the Telnet service.
Use of Hard-coded Credentials
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for D-Link Dir 300 Firmware or by D-Link? Click the Watch button to subscribe.