D-Link Dir-645 vulnerabilities

4 known vulnerabilities affecting d-link/dir-645.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2026-5815HIGHCVSS 7.4v1.01v1.02+1 more2026-04-09
CVE-2026-5815 [HIGH] CWE-119 CVE-2026-5815: A vulnerability was detected in D-Link DIR-645 1.01/1.02/1.03. Impacted is the function hedwigcgi_ma A vulnerability was detected in D-Link DIR-645 1.01/1.02/1.03. Impacted is the function hedwigcgi_main of the file /cgi-bin/hedwig.cgi. The manipulation results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maint
cvelistv5nvd
CVE-2025-10689MEDIUMCVSS 5.3v105B012025-09-18
CVE-2025-10689 [MEDIUM] CWE-74 CVE-2025-10689: A vulnerability was identified in D-Link DIR-645 105B01. This issue affects the function soapcgi_mai A vulnerability was identified in D-Link DIR-645 105B01. This issue affects the function soapcgi_main of the file /soap.cgi. Such manipulation of the argument service leads to command injection. The attack can be launched remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer support
cvelistv5nvd
CVE-2018-25115CRITICALCVSS 10.0v*2025-08-27
CVE-2018-25115 [CRITICAL] CWE-78 CVE-2018-25115: Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system commands without authentication. The flaw stems from improper input handling in the EVENT=CHECKFW parameter
cvelistv5nvd
CVE-2025-7192MEDIUMCVSS 5.3v1.05B012025-07-08
CVE-2025-7192 [MEDIUM] CWE-74 CVE-2025-7192: A vulnerability was found in D-Link DIR-645 up to 1.05B01 and classified as critical. This issue aff A vulnerability was found in D-Link DIR-645 up to 1.05B01 and classified as critical. This issue affects the function ssdpcgi_main of the file /htdocs/cgibin of the component ssdpcgi. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only a
cvelistv5nvd