Known Vulnerabilities for products from Dlink

Listed below are 20 of the newest known vulnerabilities associated with the vendor "Dlink".

These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.

Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-42784 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 9.8 - CRITICAL 2021-11-23 2021-11-29
CVE-2021-42783 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 9.8 - CRITICAL 2021-11-23 2021-11-29
CVE-2021-41753 A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in D-Link DIR-X1560, v1.04B04, and DIR-X6060, v1.11B0... 7.5 - HIGH 2021-09-27 2021-10-06
CVE-2021-41504 ** UNSUPPORTED WHEN ASSIGNED ** An Elevated Privileges issue exists in D-Link DCS-5000L v1.05 and DCS-932L v2.17 and older. T... 8 - HIGH 2021-09-24 2021-11-19
CVE-2021-40655 An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and ... 7.5 - HIGH 2021-09-24 2021-09-30
CVE-2021-40654 An information disclosure issue exist in D-LINK-DIR-615 B2 2.01mt. An attacker can obtain a user name and password by forging... 6.5 - MEDIUM 2021-09-24 2021-09-30
CVE-2021-40284 D-Link DSL-3782 EU v1.01:EU v1.03 is affected by a buffer overflow which can cause a denial of service. This vulnerability ex... 6.5 - MEDIUM 2021-09-09 2021-09-22
CVE-2021-39615 ** UNSUPPORTED WHEN ASSIGNED ** D-Link DSR-500N version 1.02 contains hard-coded credentials for undocumented user accounts i... 9.8 - CRITICAL 2021-08-23 2021-08-30
CVE-2021-39614 D-Link DVX-2000MS contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file. As weak passwords... 9.8 - CRITICAL 2021-08-23 2021-08-30
CVE-2021-39613 ** UNSUPPORTED WHEN ASSIGNED ** D-Link DVG-3104MS version 1.0.2.0.3, 1.0.2.0.4, and 1.0.2.0.4E contains hard-coded credential... 9.8 - CRITICAL 2021-08-23 2021-08-30
CVE-2021-39510 An issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router, The HTTP request parameter is used in the ha... 9.8 - CRITICAL 2021-08-24 2021-09-01
CVE-2021-39509 An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handl... 9.8 - CRITICAL 2021-08-24 2021-09-01
CVE-2021-37388 A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker... 9.8 - CRITICAL 2021-08-06 2021-08-13
CVE-2021-34830 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1... 8.8 - HIGH 2021-07-15 2021-07-20
CVE-2021-34829 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1... 8.8 - HIGH 2021-07-15 2021-07-20
CVE-2021-34828 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1... 8.8 - HIGH 2021-07-15 2021-07-20
CVE-2021-34827 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1... 8.8 - HIGH 2021-07-15 2021-07-20
CVE-2021-34204 D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device sys... 6.8 - MEDIUM 2021-06-16 2021-06-28
CVE-2021-34203 D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), when setting PPPoE, will s... 8.1 - HIGH 2021-06-16 2021-06-24
CVE-2021-34202 There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions c... 7.8 - HIGH 2021-06-16 2021-06-23

Known software with vulnerabilities from Dlink

Type Vendor Product Version
HardwareDlinkDap-1320 A2-
Operating
System
DlinkDap-1320 A2 Firmware1.21
HardwareDlinkDap-1330-
Operating
System
DlinkDap-1330 Firmware1.00.b21
HardwareDlinkDap-1360ua1
Operating
System
DlinkDap-1360u Firmware3.0.1
HardwareDlinkDap-1522a1
HardwareDlinkDap-1650-
Operating
System
DlinkDap-1650 Firmware1.04b02_j65h
HardwareDlinkDap-1860-
Operating
System
DlinkDap-1860 Firmware1.01b06
HardwareDlinkDap-2610-
Operating
System
DlinkDap-2610 Firmware-
HardwareDlinkDba-1510p-
Operating
System
DlinkDba-1510p Firmware1.70b005
Operating
System
DlinkDcs-1100 Firmware1.03
HardwareDlinkDcs-1100l-
Operating
System
DlinkDcs-1100l Firmware1.04
Operating
System
DlinkDcs-1130 Firmware1.03
HardwareDlinkDcs-1130l-

Popular searches for "Dlink"

D-LinkFTaiwanese multinational networking equipment manufacturing corporation

D-Link Corporation is a Taiwanese multinational networking equipment manufacturing corporation headquartered in Taipei, Taiwan. It was founded in March 1986 in Taipei as Datex Systems Inc.

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report