D-Link Dns 320 Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in D-Link Dns 320 Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in D-Link Dns 320 Firmware. Dns 320 Firmware did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 2 5.60
2023 0 0.00
2022 0 0.00
2021 1 9.80
2020 0 0.00
2019 1 9.80

It may take a day or so for new Dns 320 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent D-Link Dns 320 Firmware Security Vulnerabilities

Info Disclosure in D-Link DNS-320 2.02b01 WebMgmt via /cgi/discovery.cgi
CVE-2024-8461 5.3 - Medium - September 05, 2024

A vulnerability, which was classified as problematic, was found in D-Link DNS-320 2.02b01. This affects an unknown part of the file /cgi-bin/discovery.cgi of the component Web Management Interface. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.

Information Disclosure

CVE-2024-8460 D-Link DNS-320 2.02b01 WebMgmt Remote Info Disclosure via widget_api
CVE-2024-8460 5.9 - Medium - September 05, 2024

A vulnerability, which was classified as problematic, has been found in D-Link DNS-320 2.02b01. Affected by this issue is some unknown functionality of the file /cgi-bin/widget_api.cgi of the component Web Management Interface. The manipulation of the argument getHD/getSer/getSys leads to information disclosure. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.

Information Disclosure

D-Link DNS-320 FW v2.06B01 Revision Ax is affected by command injection in the system_mgr.cgi component
CVE-2020-25506 9.8 - Critical - February 02, 2021

D-Link DNS-320 FW v2.06B01 Revision Ax is affected by command injection in the system_mgr.cgi component, which can lead to remote arbitrary code execution.

Shell injection

The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection.
CVE-2019-16057 9.8 - Critical - September 16, 2019

The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection.

Shell injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for D-Link Dns 320 Firmware or by D-Link? Click the Watch button to subscribe.

 

D-Link
Vendor

 
subscribe