D-Link Dsl 224 Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in D-Link Dsl 224 Firmware.
By the Year
In 2026 there have been 0 vulnerabilities in D-Link Dsl 224 Firmware. Dsl 224 Firmware did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 1 | 8.80 |
| 2022 | 1 | 9.90 |
It may take a day or so for new Dsl 224 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent D-Link Dsl 224 Firmware Security Vulnerabilities
Post-Auth Command Exec in D-Link DSL-224 Firmware 3.0.10
CVE-2023-32223
8.8 - High
- June 28, 2023
D-Link DSL-224 firmware version 3.0.10 allows post authentication command execution via an unspecified method.
DLINK DSL-224 NTP JSON-RPC RCE before 3.0.9
CVE-2022-36786
9.9 - Critical
- November 17, 2022
DLINK - DSL-224 Post-auth RCE. DLINK router version 3.0.8 has an interface where you can configure NTP servers (Network Time Protocol) via jsonrpc API. It is possible to inject a command through this interface that will run with ROOT permissions on the router.
Command Injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for D-Link Dsl 224 Firmware or by D-Link? Click the Watch button to subscribe.