Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
dir-823g Vendor: dlink

About This Product

dir-823g is a software product offered by dlink. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 60 known vulnerabilities affecting dlink dir-823g. This includes 17 critical-severity issues and 36 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2025, indicating a sustained research interest and ongoing security attention. 7 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-17786 2018-10-02 2024-11-21 9.8 7.5 Likely
CVE-2018-17787 2018-10-02 2024-11-21 9.8 7.5 Likely
CVE-2018-17880 2018-10-03 2024-11-21 7.5 7.8 Likely
CVE-2018-17881 2018-10-03 2024-11-21 9.8 5.0 Likely
CVE-2019-7297 2019-01-31 2024-11-21 9.8 10.0 Likely
CVE-2019-7298 2019-02-01 2024-11-21 8.1 9.3 Likely
CVE-2019-7388 2019-02-05 2024-11-21 7.5 5.0 Likely
CVE-2019-7389 2019-02-05 2024-11-21 7.5 7.8 Likely
CVE-2019-7390 2019-02-05 2024-11-21 8.6 5.0 Likely
CVE-2019-8392 2019-02-17 2024-11-21 7.5 5.0 Likely
CVE-2019-13128 2019-07-01 2024-11-21 8.8 9.0 Likely
CVE-2019-15526 2019-08-23 2024-11-21 8.8 9.0 Likely
CVE-2019-15527 2019-08-23 2024-11-21 8.8 9.0 Likely
CVE-2019-15528 2019-08-23 2024-11-21 8.8 9.0 Likely
CVE-2019-15529 2019-08-23 2024-11-21 8.8 9.0 Likely
CVE-2019-15530 2019-08-23 2024-11-21 8.8 9.0 Likely
CVE-2020-25367 2021-11-04 2024-11-21 9.8 7.5 Likely
CVE-2020-25366 2021-11-04 2024-11-21 9.1 8.5 Likely
CVE-2020-25368 2021-11-04 2024-11-21 9.8 7.5 Likely
CVE-2021-43474 2022-04-07 2024-11-21 9.8 7.5 Likely
CVE-2022-43109 2022-11-03 2025-05-05 9.8 - -
CVE-2022-44201 2022-11-22 2025-04-29 9.8 - -
CVE-2022-44808 2022-11-22 2025-04-25 9.8 - -
CVE-2023-29665 2023-04-17 2025-02-06 9.8 - -
CVE-2023-26615 2023-06-28 2024-11-21 7.5 - -
CVE-2023-26612 2023-06-29 2024-11-21 9.8 - -
CVE-2023-26613 2023-06-29 2024-11-21 9.8 - -
CVE-2023-26616 2023-06-29 2024-11-21 9.8 - -
CVE-2023-43235 2023-09-21 2024-11-21 9.8 - -
CVE-2023-43241 2023-09-21 2024-11-21 9.8 - -
CVE-2023-44828 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44829 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44830 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44831 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44832 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44833 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44834 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44835 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44836 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44837 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44838 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44839 2023-10-05 2024-11-21 7.5 - -
CVE-2024-27655 2024-02-29 2025-04-21 8.8 - -
CVE-2024-27656 2024-02-29 2025-04-21 8.8 - -
CVE-2024-27657 2024-02-29 2025-04-21 8.8 - -
CVE-2024-27658 2024-02-29 2025-04-21 6.5 - -
CVE-2024-27659 2024-02-29 2025-03-17 6.5 - -
CVE-2024-27661 2024-02-29 2025-03-17 6.5 - -
CVE-2024-27662 2024-02-29 2025-04-15 6.5 - -
CVE-2024-33345 2024-04-29 2025-05-21 6.5 - -
CVE-2024-44408 2024-09-06 2024-09-10 7.5 - -
CVE-2024-51023 2024-11-05 2025-05-07 8.8 - -
CVE-2024-51024 2024-11-05 2025-05-07 8.0 - -
CVE-2024-13030 2024-12-30 2025-07-15 7.3 7.5 Likely
CVE-2025-2359 2025-03-17 2025-07-15 7.3 7.5 Likely
CVE-2025-2360 2025-03-17 2025-07-15 7.3 7.5 Likely
CVE-2025-60331 2025-10-22 2025-10-24 7.5 - -
CVE-2025-60332 2025-10-22 2025-10-24 7.5 - -
CVE-2025-60671 2025-11-13 2025-11-17 5.4 - -
CVE-2025-60675 2025-11-13 2025-11-17 5.4 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for dlink dir-823g by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.