CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

dlink

dir-601_firmware

5 known vulnerabilities · sorted by CVSS score

CVE-2019-16327
CRITICAL9.8

D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product.

dlink / dir-601_firmware
Network
Published Dec 26, 2019
CVE-2019-16326
HIGH8.8

D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token is implemented. A remote attacker could exploit this in conjunction with CVE-2019-16327 to enable remote router management and device compromise. NOTE: this is an end-of-life product.

dlink / dir-601_firmware
Network
Published Dec 26, 2019
CVE-2018-10641
HIGH8.1

D-Link DIR-601 A1 1.02NA devices do not require the old password for a password change, which occurs in cleartext.

dlink / dir-601_firmware
Network
Published May 4, 2018
CVE-2018-12710
HIGH8.0

An issue was discovered on D-Link DIR-601 2.02NA devices. Being local to the network and having only "User" account (which is a low privilege account) access, an attacker can intercept the response from a POST request to obtain "Admin" rights due to the admin password being displayed in XML.

dlink / dir-601_firmware
Adjacent
Published Aug 29, 2018
CVE-2018-5708
HIGH8.0

An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator's panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML.

dlink / dir-601_firmware
Adjacent
Published Mar 30, 2018