D-Link Dir 300 Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in D-Link Dir 300 Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in D-Link Dir 300 Firmware. Last year, in 2025 Dir 300 Firmware had 1 security vulnerability published. Right now, Dir 300 Firmware is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 1 0.00
2024 1 9.80

It may take a day or so for new Dir 300 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent D-Link Dir 300 Firmware Security Vulnerabilities

OS Command Injection (RCE) in D-Link DIR-600/300 rev B (2.14b01/2.13)
CVE-2013-10069 - August 05, 2025

The web interface of multiple D-Link routers, including DIR-600 rev B (2.14b01) and DIR-300 rev B (2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enabling persistent interactive shell access as root.

Shell injection

Hardcoded Telnet Credentials in D-Link DIR-300 REVA v1.06B05_WW
CVE-2024-41616 9.8 - Critical - August 06, 2024

D-Link DIR-300 REVA FIRMWARE v1.06B05_WW contains hardcoded credentials in the Telnet service.

Use of Hard-coded Credentials

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for D-Link Dir 300 Firmware or by D-Link? Click the Watch button to subscribe.

 

D-Link
Vendor

 
subscribe