D-Link Dir 825 Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in D-Link Dir 825 Firmware.
By the Year
In 2026 there have been 0 vulnerabilities in D-Link Dir 825 Firmware. Last year, in 2025 Dir 825 Firmware had 4 security vulnerabilities published. Right now, Dir 825 Firmware is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 4 | 9.30 |
| 2024 | 0 | 0.00 |
| 2023 | 1 | 9.80 |
| 2022 | 0 | 0.00 |
| 2021 | 1 | 7.50 |
It may take a day or so for new Dir 825 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent D-Link Dir 825 Firmware Security Vulnerabilities
D-Link DIR-825 2.10 httpd Buffer Overflow via ping_ipaddr
CVE-2025-8949
9.8 - Critical
- August 14, 2025
A vulnerability was identified in D-Link DIR-825 2.10. Affected by this vulnerability is the function get_ping_app_stat of the file ping_response.cgi of the component httpd. The manipulation of the argument ping_ipaddr leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Buffer Overflow
D-Link DIR-825 2.10 HTTPD Stack Overflow via switch_language.cgi
CVE-2025-7206
9.8 - Critical
- July 09, 2025
A vulnerability, which was classified as critical, has been found in D-Link DIR-825 2.10. This issue affects the function sub_410DDC of the file switch_language.cgi of the component httpd. The manipulation of the argument Language leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Buffer Overflow
D-Link DIR-825 2.03 Remote Stack Buffer Overflow in HTTP POST Handler
CVE-2025-6292
8.8 - High
- June 20, 2025
A vulnerability has been found in D-Link DIR-825 2.03 and classified as critical. This vulnerability affects the function sub_4091AC of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Buffer Overflow
D-Link DIR-825 v2.03 HTTP POST Handler Stack Buffer Overflow – Remote-Exploit
CVE-2025-6291
8.8 - High
- June 20, 2025
A vulnerability, which was classified as critical, was found in D-Link DIR-825 2.03. This affects the function do_file of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Buffer Overflow
Buffer Overflow in D-Link DIR-825 v1.33 via /CPE
CVE-2022-47035
9.8 - Critical
- January 31, 2023
Buffer Overflow Vulnerability in D-Link DIR-825 v1.33.0.44ebdd4-embedded and below allows attacker to execute arbitrary code via the GetConfig method to the /CPE endpoint.
Classic Buffer Overflow
Null Pointer Dereference vulnerability in D-Link DIR-825 2.10b02, which could let a remote malicious user cause a denial of service
CVE-2021-29296
7.5 - High
- August 10, 2021
Null Pointer Dereference vulnerability in D-Link DIR-825 2.10b02, which could let a remote malicious user cause a denial of service. The vulnerability could be triggered by sending an HTTP request with URL /vct_wan; the sbin/httpd would invoke the strchr function and take NULL as a first argument, which finally leads to the segmentation fault. NOTE: The DIR-825 and all hardware revisions is considered End of Life and as such this issue will not be patched
NULL Pointer Dereference
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for D-Link Dir 825 Firmware or by D-Link? Click the Watch button to subscribe.