CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

dlink

dir-605l_firmware

55 known vulnerabilities · sorted by CVSS score

CVE-2023-24348
CRITICAL9.8

D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetACLFilter.

dlink / dir-605l_firmware
Network
Published Feb 10, 2023
Page 1 of 3
CVE-2023-24351
CRITICAL9.8

D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the FILECODE parameter at /goform/formLogin.

dlink / dir-605l_firmware
Network
Published Feb 10, 2023
CVE-2023-24349
CRITICAL9.8

D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetRoute.

dlink / dir-605l_firmware
Network
Published Feb 10, 2023
CVE-2023-24352
CRITICAL9.8

D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formWPS.

dlink / dir-605l_firmware
Network
Published Feb 10, 2023
CVE-2023-24350
CRITICAL9.8

D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the config.smtp_email_subject parameter at /goform/formSetEmail.

dlink / dir-605l_firmware
Network
Published Feb 10, 2023
CVE-2023-29961
CRITICAL9.8

D-Link DIR-605L firmware version 1.17B01 BETA is vulnerable to stack overflow via /goform/formTcpipSetup,

dlink / dir-605l_firmware
Network
Published May 16, 2023
CVE-2012-10021
CRITICAL9.8

A stack-based buffer overflow vulnerability exists in D-Link DIR-605L Wireless N300 Cloud Router firmware versions 1.12 and 1.13 via the getAuthCode() function. The flaw arises from unsafe usage of sprintf() when processing user-supplied CAPTCHA data via the FILECODE parameter in /goform/formLogin. A remote unauthenticated attacker can exploit this to execute arbitrary code with root privileges on the device.

dlink / dir-605l_firmware
Network
Published Jul 31, 2025
CVE-2024-9514
HIGH8.8

A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critical. This vulnerability affects the function formSetDomainFilter of the file /goform/formSetDomainFilter. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

dlink / dir-605l_firmware
Network
Published Oct 4, 2024
CVE-2024-9565
HIGH8.8

A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. Affected by this vulnerability is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

dlink / dir-605l_firmware
Network
Published Oct 7, 2024
CVE-2024-9533
HIGH8.8

A vulnerability was found in D-Link DIR-605L 2.13B01 BETA and classified as critical. This issue affects the function formDeviceReboot of the file /goform/formDeviceReboot. The manipulation of the argument next_page leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

dlink / dir-605l_firmware
Network
Published Oct 5, 2024
CVE-2024-9551
HIGH8.8

A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critical. Affected by this vulnerability is the function formSetWanL2TP of the file /goform/formSetWanL2TP. The manipulation of the argument webpage leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

dlink / dir-605l_firmware
Network
Published Oct 6, 2024
CVE-2024-9561
HIGH8.8

A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01 BETA. This affects the function formSetWAN_Wizard51/formSetWAN_Wizard52. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

dlink / dir-605l_firmware
Network
Published Oct 6, 2024
CVE-2023-24344
HIGH8.8

D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formWlanGuestSetup.

dlink / dir-605l_firmware
Network
Published Feb 10, 2023
CVE-2024-11959
HIGH8.8

A vulnerability was found in D-Link DIR-605L 2.13B01. It has been classified as critical. This affects the function formResetStatistic of the file /goform/formResetStatistic. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

dlink / dir-605l_firmware
Network
Published Nov 28, 2024
CVE-2024-9535
HIGH8.8

A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critical. Affected by this vulnerability is the function formEasySetupWWConfig of the file /goform/formEasySetupWWConfig. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

dlink / dir-605l_firmware
Network
Published Oct 5, 2024
CVE-2024-9534
HIGH8.8

A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as critical. Affected is the function formEasySetPassword of the file /goform/formEasySetPassword. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

dlink / dir-605l_firmware
Network
Published Oct 5, 2024
CVE-2025-4442
HIGH8.8

A vulnerability was found in D-Link DIR-605L 2.13B01. It has been declared as critical. This vulnerability affects the function formSetWAN_Wizard55. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.

dlink / dir-605l_firmware
Network
Published May 9, 2025
CVE-2024-9550
HIGH8.8

A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as critical. Affected is the function formLogDnsquery of the file /goform/formLogDnsquery. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

dlink / dir-605l_firmware
Network
Published Oct 6, 2024
CVE-2023-24346
HIGH8.8

D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the wan_connected parameter at /goform/formEasySetupWizard3.

dlink / dir-605l_firmware
Network
Published Feb 10, 2023
CVE-2024-9532
HIGH8.8

A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. This vulnerability affects the function formAdvanceSetup of the file /goform/formAdvanceSetup. The manipulation of the argument webpage leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

dlink / dir-605l_firmware
Network
Published Oct 5, 2024