Known Vulnerabilities for products from D-Link

Listed below are 20 of the newest known vulnerabilities associated with the vendor "D-Link".

These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.

Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-43791 Zulip is an open source group chat application that combines real-time chat with threaded conversations. In affected versions... 6.5 - MEDIUM 2021-12-02 2021-12-02
CVE-2021-43058 An open redirect vulnerability exists in Replicated Classic versions prior to 2.53.1 that could lead to spoofing. To exploit ... 6.1 - MEDIUM 2021-11-01 2021-11-17
CVE-2021-42784 OS Command Injection vulnerability in debug_fcgi of D-Link DWR-932C E1 firmware allows a remote attacker to perform command i... 9.8 - CRITICAL 2021-11-23 2021-11-23
CVE-2021-42783 Missing Authentication for Critical Function vulnerability in debug_post_set.cgi of D-Link DWR-932C E1 firmware allows an una... 9.8 - CRITICAL 2021-11-23 2021-11-23
CVE-2021-42663 An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg... 4.3 - MEDIUM 2021-11-05 2021-11-17
CVE-2021-41873 Penguin Aurora TV Box 41502 is a high-end network HD set-top box produced by Tencent Video and Skyworth Digital. An unauthori... 10 - CRITICAL 2021-10-26 2021-10-26
CVE-2021-41753 A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in D-Link DIR-X1560, v1.04B04, and DIR-X6060, v1.11B0... 7.5 - HIGH 2021-09-27 2021-09-27
CVE-2021-41653 The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote... 9.8 - CRITICAL 2021-11-13 2021-11-13
CVE-2021-41573 Hitachi Content Platform Anywhere (HCP-AW) 4.4.5 and later allows information disclosure. If authenticated user creates a lin... 6.5 - MEDIUM 2021-09-29 2021-09-29
CVE-2021-41504 ** UNSUPPORTED WHEN ASSIGNED ** An Elevated Privileges issue exists in D-Link DCS-5000L v1.05 and DCS-932L v2.17 and older. T... 8 - HIGH 2021-09-24 2021-11-19
CVE-2021-41503 ** UNSUPPORTED WHEN ASSIGNED ** DCS-5000L v1.05 and DCS-932L v2.17 and older are affecged by Incorrect Acess Control. The use... 8 - HIGH 2021-09-24 2021-09-30
CVE-2021-34863 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 1... 8.8 - HIGH 2021-10-25 2021-10-27
CVE-2021-34862 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 1... 8.8 - HIGH 2021-10-25 2021-10-27
CVE-2021-34861 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 1... 8.8 - HIGH 2021-10-25 2021-10-27
CVE-2021-34860 This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DA... 6.5 - MEDIUM 2021-10-25 2021-10-27
CVE-2021-34204 D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device sys... 6.8 - MEDIUM 2021-06-16 2021-06-28
CVE-2021-33259 Several web interfaces in D-Link DIR-868LW 1.12b have no authentication requirements for access, allowing for attackers to ob... 5.3 - MEDIUM 2021-10-31 2021-11-02
CVE-2021-27250 This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DA... 6.5 - MEDIUM 2021-04-14 2021-04-22
CVE-2021-27249 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 v... 8.8 - HIGH 2021-04-14 2021-04-22
CVE-2021-27248 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 v... 8.8 - HIGH 2021-04-14 2021-04-22

Known software with vulnerabilities from D-Link

Type Vendor Product Version
ApplicationD-linkCamera Stream Client Activex Control1.0.0.4519
ApplicationD-linkCentral Wifimanager1.00
HardwareD-linkDap 1150-
Operating
System
D-linkDap 1150 Firmware1.2.94
HardwareD-linkDap-1320-
Operating
System
D-linkDap-1320 Firmware1.11
HardwareD-linkDap-1350rev._a1
Operating
System
D-linkDap-1350 Firmware1.10
HardwareD-linkDap-1360-
ApplicationD-linkDap-1360 Firmware2.5.4
HardwareD-linkDap-1360 Revision F-
Operating
System
D-linkDap-1360 Revision F Firmware6.12b01
HardwareD-linkDap-2230-
Operating
System
D-linkDap-2230 Firmware1.02
HardwareD-linkDap-2310-
Operating
System
D-linkDap-2310 Firmware2.06
HardwareD-linkDap-2330-
Operating
System
D-linkDap-2330 Firmware1.06
HardwareD-linkDap-2360-
Operating
System
D-linkDap-2360 Firmware2.06

Popular searches for "D-Link"

D-LinkFTaiwanese multinational networking equipment manufacturing corporation

D-Link Corporation is a Taiwanese multinational networking equipment manufacturing corporation headquartered in Taipei, Taiwan. It was founded in March 1986 in Taipei as Datex Systems Inc.

© CVE.report 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report