Product:

Dir\-605l_firmware

(Dlink)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 44
Date Id Summary Products Score Patch Annotated
2025-05-23 CVE-2025-46176 Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware analysis. Dir\-605l_firmware, Dir\-816l_firmware N/A
2024-06-13 CVE-2024-37630 D-Link DIR-605L v2.13B01 was discovered to contain a hardcoded password vulnerability in /etc/passwd, which allows attackers to log in as root. Dir\-605l_firmware N/A
2025-05-08 CVE-2025-4441 A vulnerability was found in D-Link DIR-605L 2.13B01. It has been classified as critical. This affects the function formSetWAN_Wizard534. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. Dir\-605l_firmware 9.8
2025-05-09 CVE-2025-4442 A vulnerability was found in D-Link DIR-605L 2.13B01. It has been declared as critical. This vulnerability affects the function formSetWAN_Wizard55. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. Dir\-605l_firmware 9.8
2025-05-09 CVE-2025-4443 A vulnerability was found in D-Link DIR-605L 2.13B01. It has been rated as critical. This issue affects the function sub_454F2C. The manipulation of the argument sysCmd leads to command injection. The attack may be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. Dir\-605l_firmware 9.8
2025-05-09 CVE-2025-4445 A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01. Affected is the function wake_on_lan. The manipulation of the argument mac leads to command injection. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. Dir\-605l_firmware 9.8
2021-09-24 CVE-2021-40655 An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page Dir\-605l_firmware 7.5
2015-05-01 CVE-2014-8361 The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. W1200ex\-Ms_firmware, W1200ex_firmware, W300p_firmware, W500p_firmware, Wf300hp2_firmware, Wf800hp_firmware, Wg1200hp2_firmware, Wg1200hp3_firmware, Wg1200hp_firmware, Wg1200hs2_firmware, Wg1200hs_firmware, Wg1800hp3_firmware, Wg1800hp4_firmware, Wg1900hp2_firmware, Wg1900hp_firmware, Wr8165n_firmware, Dir\-501_firmware, Dir\-515_firmware, Dir\-600l_firmware, Dir\-605l_firmware, Dir\-615_firmware, Dir\-619l_firmware, Dir\-809_firmware, Dir\-905l_firmware, Realtek_sdk 9.8
2023-05-16 CVE-2023-29961 D-Link DIR-605L firmware version 1.17B01 BETA is vulnerable to stack overflow via /goform/formTcpipSetup, Dir\-605l_firmware 9.8
2024-11-28 CVE-2024-11959 A vulnerability was found in D-Link DIR-605L 2.13B01. It has been classified as critical. This affects the function formResetStatistic of the file /goform/formResetStatistic. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Dir\-605l_firmware 8.8