CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

dlink

dir-655_firmware

6 known vulnerabilities · sorted by CVSS score

CVE-2019-13561
CRITICAL9.8

D-Link DIR-655 C devices before 3.02B05 BETA03 allow remote attackers to execute arbitrary commands via shell metacharacters in the online_firmware_check.cgi check_fw_url parameter.

dlink / dir-655_firmware
Network
Published Jul 11, 2019
CVE-2019-16920
CRITICAL9.8

Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.

dlink / dir-655_firmware+9
Network
Published Sep 27, 2019
CVE-2019-13560
CRITICAL9.8

D-Link DIR-655 C devices before 3.02B05 BETA03 allow remote attackers to force a blank password via the apply_sec.cgi setup_wizard parameter.

dlink / dir-655_firmware
Network
Published Jul 11, 2019
CVE-2019-13563
HIGH8.8

D-Link DIR-655 C devices before 3.02B05 BETA03 allow CSRF for the entire management console.

dlink / dir-655_firmware
Network
Published Jul 11, 2019
CVE-2025-6158
HIGH8.8

A vulnerability classified as critical has been found in D-Link DIR-665 1.00. This affects the function sub_AC78 of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

dlink / dir-655_firmware
Network
Published Jun 17, 2025
CVE-2019-13562
MEDIUM6.1

D-Link DIR-655 C devices before 3.02B05 BETA03 allow XSS, as demonstrated by the /www/ping_response.cgi ping_ipaddr parameter, the /www/ping6_response.cgi ping6_ipaddr parameter, and the /www/apply_sec.cgi html_response_return_page parameter.

dlink / dir-655_firmware
Network
Published Jul 11, 2019