Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

d-link

About This Vendor

d-link is a technology vendor producing software and infrastructure products. As a software provider, d-link's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of d-link's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 113 known vulnerabilities from d-link. This includes 34 critical-severity issues and 42 high-severity issues that represent significant risk. These vulnerabilities affect 227 distinct products across d-link's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2001 through 2022, indicating decades of continuous security attention and research. Organizations deploying d-link products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2001-1137 2001-09-06 2025-04-03 - 5.0 Likely
CVE-2001-1220 2001-12-21 2025-04-03 - 10.0 Likely
CVE-2001-1221 2001-12-21 2025-04-03 - 5.0 Likely
CVE-2002-1068 2002-10-04 2025-04-03 - 5.0 Likely
CVE-2002-1069 2002-10-04 2025-04-03 - 5.0 Likely
CVE-2002-1865 2002-12-31 2025-04-03 - 5.0 Likely
CVE-2002-2137 2002-12-31 2025-04-03 - 5.0 Likely
CVE-2003-1264 2003-12-31 2025-04-03 - 5.0 Likely
CVE-2003-1346 2003-12-31 2025-04-03 - 10.0 Likely
CVE-2004-0661 2004-08-06 2025-04-03 - 5.0 Likely
CVE-2004-1650 2004-08-31 2025-04-03 - 7.5 Likely
CVE-2004-0615 2004-12-06 2025-04-03 - 5.1 Unknown
CVE-2005-1680 2005-05-20 2025-04-03 - 7.5 Likely
CVE-2005-4723 2005-12-31 2025-04-03 - 5.0 Likely
CVE-2006-0784 2006-02-19 2025-04-03 - 5.0 Likely
CVE-2006-2337 2006-05-12 2025-04-03 - 5.0 Likely
CVE-2006-2653 2006-05-30 2025-04-03 - 2.6 Unknown
CVE-2006-2901 2006-06-07 2025-04-03 - 5.0 Likely
CVE-2006-3687 2006-07-21 2025-04-03 - 7.5 Likely
CVE-2006-5536 2006-10-26 2025-04-09 - 5.0 Likely
CVE-2006-5537 2006-10-26 2025-04-09 - 4.3 Likely
CVE-2006-5538 2006-10-26 2025-04-09 - 5.0 Likely
CVE-2006-6055 2006-11-22 2025-04-09 - 10.0 Likely
CVE-2006-6538 2006-12-14 2025-04-09 - 7.8 Likely
CVE-2007-1435 2007-03-13 2025-04-09 - 10.0 Likely
CVE-2007-0933 2007-06-05 2025-04-09 - 7.8 Likely
CVE-2007-3347 2007-06-22 2025-04-09 - 7.8 Likely
CVE-2007-3348 2007-06-22 2025-04-09 - 7.8 Likely
CVE-2008-1253 2008-03-10 2025-04-09 - 4.3 Likely
CVE-2008-1258 2008-03-10 2025-04-09 - 4.3 Likely
CVE-2008-4133 2008-09-19 2025-04-09 - 4.3 Likely
CVE-2008-4771 2008-10-28 2025-04-09 - 9.3 Likely
CVE-2009-3347 2009-09-24 2025-04-09 - 10.0 Likely
CVE-2010-0936 2010-03-08 2025-04-11 - 4.3 Likely
CVE-2010-2292 2010-06-15 2025-04-11 - 4.3 Likely
CVE-2010-2293 2010-06-15 2025-04-11 - 6.8 Likely
CVE-2013-7320 2014-02-06 2025-04-11 - 6.8 Likely
CVE-2013-7321 2014-02-06 2025-04-11 - 4.3 Likely
CVE-2014-9234 2014-12-03 2025-04-12 - 5.0 Likely
CVE-2014-9238 2014-12-03 2025-04-12 - 5.0 Likely
CVE-2014-9518 2015-01-05 2025-04-12 - 4.3 Likely
CVE-2016-5681 2016-08-25 2025-04-12 9.8 9.3 Likely
CVE-2017-5633 2017-03-06 2025-04-20 8.0 8.5 Unknown
CVE-2017-5874 2017-03-22 2025-04-20 8.8 6.8 Likely
CVE-2017-7398 2017-04-04 2025-04-20 8.8 6.8 Likely
CVE-2016-1559 2017-04-21 2025-04-20 8.1 2.6 Unknown
CVE-2015-7245 2017-04-24 2025-04-20 7.5 5.0 Likely
CVE-2015-7246 2017-04-24 2025-04-20 9.8 10.0 Likely
CVE-2015-7247 2017-04-24 2025-04-20 9.8 7.8 Likely
CVE-2017-9542 2017-06-11 2025-04-20 9.8 10.0 Likely
CVE-2017-10676 2017-07-20 2025-04-20 6.1 4.3 Likely
CVE-2014-7857 2017-08-25 2025-04-20 9.8 10.0 Likely
CVE-2014-7858 2017-08-25 2025-04-20 9.8 10.0 Likely
CVE-2014-7859 2017-08-25 2025-04-20 9.8 7.5 Likely
CVE-2014-7860 2017-08-25 2025-04-20 5.3 5.0 Likely
CVE-2016-10405 2017-09-07 2025-04-20 9.8 7.5 Likely
CVE-2017-7851 2017-11-15 2025-04-20 8.8 6.8 Likely
CVE-2017-3191 2017-12-16 2025-04-20 9.8 5.0 Likely
CVE-2017-3192 2017-12-16 2025-04-20 9.8 5.0 Likely
CVE-2018-5371 2018-01-12 2024-11-21 8.8 9.0 Likely
CVE-2018-6936 2018-02-21 2024-11-21 5.4 3.5 Unknown
CVE-2018-7698 2018-03-05 2024-11-21 8.1 4.3 Likely
CVE-2018-8941 2018-04-03 2024-11-21 8.8 9.0 Likely
CVE-2018-10110 2018-04-18 2024-11-21 4.8 3.5 Unknown
CVE-2018-10431 2018-04-26 2024-11-21 7.2 6.5 Likely
CVE-2018-10713 2018-05-03 2024-11-21 8.8 6.5 Likely
CVE-2018-10746 2018-05-04 2024-11-21 8.8 9.0 Likely
CVE-2018-10747 2018-05-04 2024-11-21 8.8 9.0 Likely
CVE-2018-10748 2018-05-04 2024-11-21 8.8 9.0 Likely
CVE-2018-10749 2018-05-04 2024-11-21 8.8 9.0 Likely
CVE-2018-10750 2018-05-04 2024-11-21 8.8 9.3 Likely
CVE-2018-10996 2018-05-12 2024-11-21 9.8 10.0 Likely
CVE-2018-11013 2018-05-13 2024-11-21 9.8 10.0 Likely
CVE-2018-10967 2018-05-18 2024-11-21 8.8 9.0 Likely
CVE-2018-10968 2018-05-18 2024-11-21 9.8 7.5 Likely
CVE-2018-6211 2018-06-20 2024-11-21 7.2 9.0 Likely
CVE-2018-6212 2018-06-20 2024-11-21 6.1 4.3 Likely
CVE-2018-6213 2018-06-20 2024-11-21 9.8 10.0 Likely
CVE-2018-12103 2018-07-05 2024-11-21 6.5 3.3 Unknown
CVE-2018-16408 2018-09-03 2024-11-21 7.2 9.0 Likely
CVE-2018-17786 2018-10-02 2024-11-21 9.8 7.5 Likely
CVE-2018-17787 2018-10-02 2024-11-21 9.8 7.5 Likely
CVE-2018-17880 2018-10-03 2024-11-21 7.5 7.8 Likely
CVE-2018-17881 2018-10-03 2024-11-21 9.8 5.0 Likely
CVE-2018-14080 2018-10-09 2024-11-21 7.5 5.0 Likely
CVE-2018-14081 2018-10-09 2024-11-21 9.8 5.0 Likely
CVE-2018-18636 2018-10-24 2024-11-21 6.1 4.3 Likely
CVE-2018-20056 2018-12-11 2024-11-21 9.8 7.5 Likely
CVE-2018-20057 2018-12-11 2024-11-21 8.8 9.0 Likely
CVE-2018-20305 2018-12-20 2024-11-21 9.8 7.5 Likely
CVE-2018-18441 2018-12-20 2024-11-21 7.5 5.0 Likely
CVE-2018-18442 2018-12-20 2024-11-21 7.5 7.8 Likely
CVE-2018-18767 2018-12-20 2024-11-21 7.0 1.9 Unknown
CVE-2018-20389 2018-12-23 2024-11-21 9.8 5.0 Likely
CVE-2019-7297 2019-01-31 2024-11-21 9.8 10.0 Likely
CVE-2019-9124 2019-02-25 2024-11-21 9.8 7.5 Likely
CVE-2019-9125 2019-02-25 2024-11-21 9.8 7.5 Likely
CVE-2018-19300 2019-04-11 2024-11-21 9.8 10.0 Likely
CVE-2018-19986 2019-05-13 2024-11-21 9.8 10.0 Likely
CVE-2018-19987 2019-05-13 2024-11-21 9.8 10.0 Likely
CVE-2018-19988 2019-05-13 2024-11-21 9.8 7.5 Likely
CVE-2018-19989 2019-05-13 2024-11-21 9.8 10.0 Likely
CVE-2018-19990 2019-05-13 2024-11-21 9.8 10.0 Likely
CVE-2019-17663 2019-10-16 2024-11-21 6.1 4.3 Likely
CVE-2013-6811 2019-11-22 2024-11-21 8.8 6.8 Likely
CVE-2020-9544 2020-03-05 2024-11-21 7.5 5.0 Likely
CVE-2020-15633 2020-07-23 2024-11-21 8.8 5.8 Unknown
CVE-2019-6258 2020-08-18 2024-11-21 9.8 7.5 Likely
CVE-2021-26709 2021-04-07 2024-11-21 9.8 10.0 Likely
CVE-2021-41503 2021-09-24 2024-11-21 8.0 5.2 Unknown
CVE-2021-33259 2021-10-31 2024-11-21 5.3 5.0 Likely
CVE-2022-44928 2022-12-02 2025-04-24 9.8 - -
CVE-2022-44929 2022-12-02 2025-04-24 9.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for d-link by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with d-link's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.