D-Link Dir 816l

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in D-Link Dir 816l.

By the Year

In 2026 there have been 0 vulnerabilities in D-Link Dir 816l. Last year, in 2025 Dir 816l had 3 security vulnerabilities published. Right now, Dir 816l is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 3 9.13

It may take a day or so for new Dir 816l vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent D-Link Dir 816l Security Vulnerabilities

D-Link DIR-816L /soap.cgi Stack Buffer Overflow Remote Exploit
CVE-2025-13191 8.8 - High - November 15, 2025

A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.

Stack Overflow

D-Link DIR-816L Router: Remote Stack-Based Buffer Overflow
CVE-2025-13190 8.8 - High - November 15, 2025

A vulnerability was found in D-Link DIR-816L 2_06_b09_beta. This vulnerability affects the function scandir_main of the file /portal/__ajax_exporer.sgi. The manipulation of the argument en results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

Stack Overflow

DIR-816L: Stack-based Buffer Overflow via Password Argument
CVE-2025-13188 9.8 - Critical - November 14, 2025

A vulnerability was detected in D-Link DIR-816L 2_06_b09_beta. Affected by this vulnerability is the function authenticationcgi_main of the file /authentication.cgi. Performing manipulation of the argument Password results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Stack Overflow

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for D-Link Dir 816l or by D-Link? Click the Watch button to subscribe.

 

D-Link
Vendor

 
subscribe