Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
dir-823g_firmware Vendor: dlink

About This Product

dir-823g_firmware is a software product offered by dlink. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 56 known vulnerabilities affecting dlink dir-823g_firmware. This includes 13 critical-severity issues and 35 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2019 to 2025, indicating a sustained research interest and ongoing security attention. 8 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2019-7298 2019-02-01 2024-11-21 8.1 9.3 Likely
CVE-2019-7388 2019-02-05 2024-11-21 7.5 5.0 Likely
CVE-2019-7389 2019-02-05 2024-11-21 7.5 7.8 Likely
CVE-2019-7390 2019-02-05 2024-11-21 8.6 5.0 Likely
CVE-2019-8392 2019-02-17 2024-11-21 7.5 5.0 Likely
CVE-2019-13128 2019-07-01 2024-11-21 8.8 9.0 Likely
CVE-2019-15526 2019-08-23 2024-11-21 8.8 9.0 Likely
CVE-2019-15527 2019-08-23 2024-11-21 8.8 9.0 Likely
CVE-2019-15528 2019-08-23 2024-11-21 8.8 9.0 Likely
CVE-2019-15529 2019-08-23 2024-11-21 8.8 9.0 Likely
CVE-2019-15530 2019-08-23 2024-11-21 8.8 9.0 Likely
CVE-2020-25367 2021-11-04 2024-11-21 9.8 7.5 Likely
CVE-2020-25366 2021-11-04 2024-11-21 9.1 8.5 Likely
CVE-2020-25368 2021-11-04 2024-11-21 9.8 7.5 Likely
CVE-2021-43474 2022-04-07 2024-11-21 9.8 7.5 Likely
CVE-2022-43109 2022-11-03 2025-05-05 9.8 - -
CVE-2022-44201 2022-11-22 2025-04-29 9.8 - -
CVE-2022-44808 2022-11-22 2025-04-25 9.8 - -
CVE-2023-29665 2023-04-17 2025-02-06 9.8 - -
CVE-2023-26615 2023-06-28 2024-11-21 7.5 - -
CVE-2023-26612 2023-06-29 2024-11-21 9.8 - -
CVE-2023-26613 2023-06-29 2024-11-21 9.8 - -
CVE-2023-26616 2023-06-29 2024-11-21 9.8 - -
CVE-2023-43235 2023-09-21 2024-11-21 9.8 - -
CVE-2023-43241 2023-09-21 2024-11-21 9.8 - -
CVE-2023-44828 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44829 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44830 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44831 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44832 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44833 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44834 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44835 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44836 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44837 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44838 2023-10-05 2024-11-21 7.5 - -
CVE-2023-44839 2023-10-05 2024-11-21 7.5 - -
CVE-2024-27655 2024-02-29 2025-04-21 8.8 - -
CVE-2024-27656 2024-02-29 2025-04-21 8.8 - -
CVE-2024-27657 2024-02-29 2025-04-21 8.8 - -
CVE-2024-27658 2024-02-29 2025-04-21 6.5 - -
CVE-2024-27659 2024-02-29 2025-03-17 6.5 - -
CVE-2024-27660 2024-02-29 2025-03-17 6.5 - -
CVE-2024-27661 2024-02-29 2025-03-17 6.5 - -
CVE-2024-27662 2024-02-29 2025-04-15 6.5 - -
CVE-2024-33345 2024-04-29 2025-05-21 6.5 - -
CVE-2024-44408 2024-09-06 2024-09-10 7.5 - -
CVE-2024-51023 2024-11-05 2025-05-07 8.8 - -
CVE-2024-51024 2024-11-05 2025-05-07 8.0 - -
CVE-2024-13030 2024-12-30 2025-07-15 7.3 7.5 Likely
CVE-2025-2359 2025-03-17 2025-07-15 7.3 7.5 Likely
CVE-2025-2360 2025-03-17 2025-07-15 7.3 7.5 Likely
CVE-2025-60331 2025-10-22 2025-10-24 7.5 - -
CVE-2025-60332 2025-10-22 2025-10-24 7.5 - -
CVE-2025-60671 2025-11-13 2025-11-17 5.4 - -
CVE-2025-60675 2025-11-13 2025-11-17 5.4 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for dlink dir-823g_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.