D-Link threat watch

D-Link CVE coverage for routers, cameras, NAS devices, and end-of-life edge equipment still present in business networks.

Vendor watch hub

What this page covers

The D-Linkwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent D-Link activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

128

Active

28

Featured

28

Unique CVEs

20

Most recent entry

Apr 28, 2026, 10:16 AM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent D-Link watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

dir-825m firmware vulnerability (CVE-2026-7289)

HIGH
watchNVDCVE-2026-7289

A vulnerability was found in D-Link DIR-825M 1.1.12. This issue affects the function sub_414BA8 of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

Apr 28, 2026, 10:16 AMOfficial source

dir-825m firmware vulnerability (CVE-2026-7288)

HIGH
watchNVDCVE-2026-7288

A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability affects the function sub_4151FC of the file /boafrm/formVpnConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

Apr 28, 2026, 10:16 AMOfficial source

di-8100 firmware vulnerability (CVE-2026-7248)

HIGH
watchNVDCVE-2026-7248

A vulnerability was found in D-Link DI-8100 16.07.26A1. This affects the function tgfile_htm of the file tgfile.htm of the component CGI Endpoint. The manipulation of the argument fn results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

Apr 28, 2026, 4:16 AMOfficial source

di-8100 firmware vulnerability (CVE-2026-7247)

HIGH
watchNVDCVE-2026-7247

A vulnerability has been found in D-Link DI-8100 16.07.26A1. Affected by this issue is the function file_exten_asp of the file file_exten.asp of the component File Extension Handler. The manipulation of the argument Name leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

Apr 28, 2026, 4:16 AMOfficial source

dir-825 firmware vulnerability (CVE-2026-7069)

HIGH
watchNVDCVE-2026-7069

A security flaw has been discovered in D-Link DIR-825 up to 3.00b32. This impacts the function AddPortMapping of the file upnpsoap.c of the component miniupnpd. Performing a manipulation of the argument NewPortMappingDescription results in buffer overflow. The attack needs to be approached within the local network. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 26, 2026, 7:16 PMOfficial source

dir-825 firmware vulnerability (CVE-2026-7068)

HIGH
watchNVDCVE-2026-7068

A vulnerability was identified in D-Link DIR-825 3.00b32. This affects the function NMBD_process of the file sserver.c of the component nmbd. Such manipulation leads to buffer overflow. The attack can only be initiated within the local network. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 26, 2026, 7:16 PMOfficial source

dir-822 firmware vulnerability (CVE-2026-7067)

MEDIUM
watchNVDCVE-2026-7067

A vulnerability was determined in D-Link DIR-822 A_101. The impacted element is the function system of the file /udhcpcd/dhcpd.c of the component udhcpd DHCP Service. This manipulation of the argument Hostname causes command injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 26, 2026, 7:16 PMOfficial source

D-Link DIR-823X Command Injection Vulnerability

critical
activeCISA KEVCVE-2025-29635

D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Apr 23, 2026, 7:00 PMOfficial source

dir-513 firmware vulnerability (CVE-2026-6014)

HIGH
watchNVDCVE-2026-6014

A flaw has been found in D-Link DIR-513 1.10. This issue affects the function formAdvanceSetup of the file /goform/formAdvanceSetup of the component POST Request Handler. This manipulation of the argument webpage causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 10, 2026, 12:16 AMOfficial source

dir-513 firmware vulnerability (CVE-2026-6013)

HIGH
watchNVDCVE-2026-6013

A vulnerability was detected in D-Link DIR-513 1.10. This vulnerability affects the function formSetRoute of the file /goform/formSetRoute of the component POST Request Handler. The manipulation of the argument curTime results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 10, 2026, 12:16 AMOfficial source

dir-513 firmware vulnerability (CVE-2026-6012)

HIGH
watchNVDCVE-2026-6012

A security vulnerability has been detected in D-Link DIR-513 1.10. This affects the function formSetPassword of the file /goform/formSetPassword of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 10, 2026, 12:16 AMOfficial source

dir-605l firmware vulnerability (CVE-2026-5984)

HIGH
watchNVDCVE-2026-5984

A vulnerability was identified in D-Link DIR-605L 2.13B01. Impacted is the function formSetLog of the file /goform/formSetLog of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 9, 2026, 5:16 PMOfficial source

dir-605l firmware vulnerability (CVE-2026-5983)

HIGH
watchNVDCVE-2026-5983

A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /goform/formSetDDNS of the component POST Request Handler. Executing a manipulation of the argument curTime can lead to buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 9, 2026, 5:16 PMOfficial source

dir-605l firmware vulnerability (CVE-2026-5982)

HIGH
watchNVDCVE-2026-5982

A vulnerability was found in D-Link DIR-605L 2.13B01. This vulnerability affects the function formAdvNetwork of the file /goform/formAdvNetwork of the component POST Request Handler. Performing a manipulation of the argument curTime results in buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 9, 2026, 5:16 PMOfficial source

dir-605l firmware vulnerability (CVE-2026-5981)

HIGH
watchNVDCVE-2026-5981

A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the function formAdvFirewall of the file /goform/formAdvFirewall of the component POST Request Handler. Such manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 9, 2026, 5:16 PMOfficial source

dir-605l firmware vulnerability (CVE-2026-5980)

HIGH
watchNVDCVE-2026-5980

A flaw has been found in D-Link DIR-605L 2.13B01. Affected by this issue is the function formSetMACFilter of the file /goform/formSetMACFilter of the component POST Request Handler. This manipulation of the argument curTime causes buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 9, 2026, 4:16 PMOfficial source

dir-605l firmware vulnerability (CVE-2026-5979)

HIGH
watchNVDCVE-2026-5979

A vulnerability was detected in D-Link DIR-605L 2.13B01. Affected by this vulnerability is the function formVirtualServ of the file /goform/formVirtualServ of the component POST Request Handler. The manipulation of the argument curTime results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 9, 2026, 4:16 PMOfficial source

dir-882 firmware vulnerability (CVE-2026-5844)

HIGH
watchNVDCVE-2026-5844

A vulnerability was found in D-Link DIR-882 1.01B02. Impacted is the function sprintf of the file prog.cgi of the component HNAP1 SetNetworkSettings Handler. The manipulation of the argument IPAddress results in os command injection. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 9, 2026, 12:16 AMOfficial source

D-Link DIR-645 vulnerability (CVE-2026-5815)

HIGH
watchNVDCVE-2026-5815

A vulnerability was detected in D-Link DIR-645 1.01/1.02/1.03. Impacted is the function hedwigcgi_main of the file /cgi-bin/hedwig.cgi. The manipulation results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Apr 8, 2026, 7:16 PMOfficial source

di-8003 firmware vulnerability (CVE-2025-50654)

HIGH
watchNVDCVE-2025-50654

A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper validation of the id parameter in the /thd_member.asp endpoint.

Apr 8, 2026, 2:24 PMOfficial source

Related vendors

Other security vendors in the radar

Vendor watch FAQ

Common questions

What is the D-Link threat watch page?

It is the D-Link-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the D-Link watch page?

Use it to confirm whether current D-Link issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to D-Link security issues?

Yes. ITECS can help map D-Link advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.