D-Link threat watch

D-Link CVE coverage for routers, cameras, NAS devices, and end-of-life edge equipment still present in business networks.

Vendor watch hub

What this page covers

The D-Linkwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent D-Link activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

200

Active

28

Featured

51

Unique CVEs

20

Most recent entry

May 11, 2026, 7:17 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent D-Link watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

dir-816 firmware vulnerability (CVE-2026-8346)

LOW
watchNVDCVE-2026-8346

A vulnerability was detected in D-Link DIR-816 1.10CNB05_R1B011D88210. This affects the function portForward. Performing a manipulation of the argument ip_address results in command injection. The attack can be initiated remotely. The exploit is now public and may be used.

May 11, 2026, 7:17 PMOfficial source

dir-816 firmware vulnerability (CVE-2026-8345)

LOW
watchNVDCVE-2026-8345

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05_R1B011D88210. Affected by this issue is the function sub_445E7C of the file /goform/singlePortForward. Such manipulation of the argument ip_address leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

May 11, 2026, 6:20 PMOfficial source

dir-816 firmware vulnerability (CVE-2026-8344)

LOW
watchNVDCVE-2026-8344

A weakness has been identified in D-Link DIR-816 1.10CNB05_R1B011D88210. Affected by this vulnerability is the function sub_445E7C of the file /goform/formDMZ.cgi. This manipulation causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.

May 11, 2026, 5:22 PMOfficial source

dns-320 firmware vulnerability (CVE-2026-8273)

MEDIUM
watchNVDCVE-2026-8273

A weakness has been identified in D-Link DNS-320 2.06B01. This impacts the function cgi_set_host/cgi_set_ntp/cgi_fan_control/cgi_merge_user of the file /cgi-bin/system_mgr.cgi. This manipulation causes os command injection. It is possible to initiate the attack remotely.

May 11, 2026, 12:16 AMOfficial source

dns-320 firmware vulnerability (CVE-2026-8272)

LOW
watchNVDCVE-2026-8272

A security flaw has been discovered in D-Link DNS-320 2.06B01. This affects the function delete/rename/copy/move/chmod/chown of the file /cgi-bin/webfile_mgr.cgi. The manipulation results in os command injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.

May 11, 2026, 12:16 AMOfficial source

dns-320 firmware vulnerability (CVE-2026-8271)

LOW
watchNVDCVE-2026-8271

A vulnerability was identified in D-Link DNS-320 2.06B01. The impacted element is the function cgi_speed/cgi_dhcpd_lease/cgi_ddns/cgi_set_ip/cgi_upnp_del/cgi_dhcpd/cgi_upnp_add/cgi_upnp_edit of the file /cgi-bin/network_mgr.cgi. The manipulation leads to os command injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

May 11, 2026, 12:16 AMOfficial source

dcs-935l firmware vulnerability (CVE-2026-8260)

HIGH
watchNVDCVE-2026-8260

A vulnerability was found in D-Link DCS-935L up to 1.10.01. The impacted element is the function SetDeviceSettings of the file /web/cgi-bin/hnap/hnap_service of the component HNAP Service. The manipulation of the argument AdminPassword results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

May 10, 2026, 9:16 PMOfficial source

di-8100 firmware vulnerability (CVE-2026-7857)

HIGH
watchNVDCVE-2026-7857

A vulnerability has been found in D-Link DI-8100 16.07.26A1. This vulnerability affects the function sprintf of the file /user_group.asp of the component CGI Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

May 5, 2026, 3:16 PMOfficial source

di-8100 firmware vulnerability (CVE-2026-7856)

HIGH
watchNVDCVE-2026-7856

A flaw has been found in D-Link DI-8100 16.07.26A1. This affects an unknown part of the file /url_member.asp of the component Web Management Interface. Executing a manipulation of the argument Name can lead to buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.

May 5, 2026, 3:16 PMOfficial source

di-8100 firmware vulnerability (CVE-2026-7855)

HIGH
watchNVDCVE-2026-7855

A vulnerability was detected in D-Link DI-8100 16.07.26A1. Affected by this issue is the function tggl_asp of the file /tggl.asp of the component HTTP Request Handler. Performing a manipulation of the argument Name results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

May 5, 2026, 2:16 PMOfficial source

di-8100 firmware vulnerability (CVE-2026-7854)

HIGH
watchNVDCVE-2026-7854

A security vulnerability has been detected in D-Link DI-8100 16.07.26A1. Affected by this vulnerability is the function url_rule_asp of the file /url_rule.asp of the component POST Parameter Handler. Such manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

May 5, 2026, 2:16 PMOfficial source

di-8100 firmware vulnerability (CVE-2026-7853)

HIGH
watchNVDCVE-2026-7853

A weakness has been identified in D-Link DI-8100 16.07.26A1. Affected is the function sprintf of the file /auto_reboot.asp of the component HTTP Handler. This manipulation of the argument enable/time causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.

May 5, 2026, 1:16 PMOfficial source

di-8100 firmware vulnerability (CVE-2026-7851)

HIGH
watchNVDCVE-2026-7851

A vulnerability was identified in D-Link DI-8100 16.07.26A1. This affects the function sprintf of the file yyxz.asp. The manipulation of the argument ID leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

May 5, 2026, 1:16 PMOfficial source

dir-600l firmware vulnerability (CVE-2026-42375)

HIGH
watchNVDCVE-2026-42375

D-Link DIR-600L Hardware Revision A1 (End-of-Life) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn35_dlwbr_dir600l" read from /etc/alpha_config/image_sign. The custom telnetd binary accepts a -u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control. The device has reached End-of-Life (EOL) and will not receive patches.

May 4, 2026, 12:16 PMOfficial source

dir-600l firmware vulnerability (CVE-2026-42374)

HIGH
watchNVDCVE-2026-42374

D-Link DIR-600L Hardware Revision B1 (End-of-Life) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn61_dlwbr_dir600L" read from /etc/alpha_config/image_sign. The custom telnetd binary accepts a -u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control.  The device has reached End-of-Life (EOL) and will not receive patches.

May 4, 2026, 12:16 PMOfficial source

dir-605l firmware vulnerability (CVE-2026-42373)

HIGH
watchNVDCVE-2026-42373

D-Link DIR-605L Hardware Revision B2 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The device starts a telnet daemon at boot via /bin/telnetd.sh with the username "Alphanetworks" and the static password "wrgn76_dlwbr_dir605L" read from /etc/alpha_config/image_sign. The custom telnetd binary accepts a -u user:password flag, and the custom login binary uses strcmp() to validate credentials. Successful authentication grants an unauthenticated attacker on the local network a root shell with full administrative control. The device has reached End-of-Life (EOL) and will not receive patches.

May 4, 2026, 12:16 PMOfficial source

m60 firmware vulnerability (CVE-2026-7554)

LOW
watchNVDCVE-2026-7554

A vulnerability was determined in D-Link M60 up to 1.20B02. Affected by this issue is some unknown functionality of the file /usr/bin/httpd. This manipulation causes weak password recovery. The attack can be initiated remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been publicly disclosed and may be utilized.

May 1, 2026, 1:16 AMOfficial source

dir-825m firmware vulnerability (CVE-2026-7289)

HIGH
watchNVDCVE-2026-7289

A vulnerability was found in D-Link DIR-825M 1.1.12. This issue affects the function sub_414BA8 of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

Apr 28, 2026, 10:16 AMOfficial source

dir-825m firmware vulnerability (CVE-2026-7288)

HIGH
watchNVDCVE-2026-7288

A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability affects the function sub_4151FC of the file /boafrm/formVpnConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

Apr 28, 2026, 10:16 AMOfficial source

di-8100 firmware vulnerability (CVE-2026-7248)

HIGH
watchNVDCVE-2026-7248

A vulnerability was found in D-Link DI-8100 16.07.26A1. This affects the function tgfile_htm of the file tgfile.htm of the component CGI Endpoint. The manipulation of the argument fn results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

Apr 28, 2026, 4:16 AMOfficial source

Related vendors

Other security vendors in the radar

Vendor watch FAQ

Common questions

What is the D-Link threat watch page?

It is the D-Link-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the D-Link watch page?

Use it to confirm whether current D-Link issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to D-Link security issues?

Yes. ITECS can help map D-Link advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.