D-Link Dsl 224 Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in D-Link Dsl 224 Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in D-Link Dsl 224 Firmware. Dsl 224 Firmware did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 1 8.80
2022 1 9.90

It may take a day or so for new Dsl 224 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent D-Link Dsl 224 Firmware Security Vulnerabilities

Post-Auth Command Exec in D-Link DSL-224 Firmware 3.0.10
CVE-2023-32223 8.8 - High - June 28, 2023

D-Link DSL-224 firmware version 3.0.10 allows post authentication command execution via an unspecified method.

DLINK DSL-224 NTP JSON-RPC RCE before 3.0.9
CVE-2022-36786 9.9 - Critical - November 17, 2022

DLINK - DSL-224 Post-auth RCE. DLINK router version 3.0.8 has an interface where you can configure NTP servers (Network Time Protocol) via jsonrpc API. It is possible to inject a command through this interface that will run with ROOT permissions on the router.

Command Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for D-Link Dsl 224 Firmware or by D-Link? Click the Watch button to subscribe.

 

D-Link
Vendor

 
subscribe