Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
dir-513 Vendor: dlink

About This Product

dir-513 is a software product offered by dlink. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 40 known vulnerabilities affecting dlink dir-513. This includes 21 critical-severity issues and 19 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2025 to 2026, indicating a recent active security attention.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2025-6882 2025-06-30 2025-07-14 8.8 9.0 Likely
CVE-2025-7909 2025-07-20 2025-07-25 8.8 9.0 Likely
CVE-2025-7910 2025-07-20 2025-07-25 8.8 9.0 Likely
CVE-2025-8159 2025-07-25 2025-09-16 8.8 9.0 Likely
CVE-2025-8168 2025-07-25 2025-07-31 8.8 9.0 Likely
CVE-2025-8169 2025-07-25 2025-07-31 8.8 9.0 Likely
CVE-2025-8184 2025-07-26 2025-07-31 8.8 9.0 Likely
CVE-2025-10792 2025-09-22 2025-10-08 8.8 9.0 Likely
CVE-2025-70236 2026-03-03 2026-03-04 9.8 - -
CVE-2025-70237 2026-03-03 2026-03-09 9.8 - -
CVE-2025-70241 2026-03-03 2026-03-09 9.8 - -
CVE-2025-70234 2026-03-03 2026-03-09 9.8 - -
CVE-2025-70239 2026-03-03 2026-03-09 9.8 - -
CVE-2025-70240 2026-03-03 2026-03-09 9.8 - -
CVE-2025-70218 2026-03-04 2026-03-06 9.8 - -
CVE-2025-70220 2026-03-04 2026-03-06 9.8 - -
CVE-2025-70223 2026-03-04 2026-03-06 9.8 - -
CVE-2025-70226 2026-03-04 2026-03-06 9.8 - -
CVE-2025-70219 2026-03-04 2026-03-06 9.8 - -
CVE-2025-46108 2026-03-04 2026-03-06 9.8 - -
CVE-2025-70221 2026-03-04 2026-03-06 9.8 - -
CVE-2025-70225 2026-03-04 2026-03-06 9.8 - -
CVE-2025-70222 2026-03-04 2026-03-06 9.8 - -
CVE-2025-70229 2026-03-05 2026-03-06 9.8 - -
CVE-2025-70230 2026-03-05 2026-03-06 9.8 - -
CVE-2025-70231 2026-03-05 2026-03-06 9.8 - -
CVE-2025-70232 2026-03-05 2026-03-06 9.8 - -
CVE-2025-70233 2026-03-05 2026-03-06 9.8 - -
CVE-2025-70238 2026-03-09 2026-03-11 7.5 - -
CVE-2025-70243 2026-03-09 2026-03-11 7.5 - -
CVE-2025-70250 2026-03-09 2026-03-11 7.5 - -
CVE-2025-70227 2026-03-10 2026-03-11 7.5 - -
CVE-2025-70242 2026-03-10 2026-03-11 7.5 - -
CVE-2025-70246 2026-03-10 2026-03-11 7.5 - -
CVE-2025-70247 2026-03-10 2026-03-11 7.5 - -
CVE-2025-70249 2026-03-10 2026-03-11 7.5 - -
CVE-2025-70251 2026-03-10 2026-03-11 7.5 - -
CVE-2025-70244 2026-03-10 2026-03-11 7.5 - -
CVE-2026-3978 2026-03-12 2026-03-16 8.8 9.0 Likely
CVE-2025-70245 2026-03-12 2026-03-13 9.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for dlink dir-513 by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.