Advisory

Critical flaws reported in end-of-life D-Link DIR-816 routers

Take action: If you have a D-Link DIR-816 router, be aware that it's critically vulnerable with no security patches ever coming since it's end-of-life. Immediately replace it with a router model that still receives security updates - don't wait as these flaws allow complete remote takeover without any authentication.


Learn More

Security researchers are reporting a series of critical vulnerabilities affecting D-Link DIR-816 routers that could allow attackers to achieve complete remote code execution without requiring authentication. 

Vulnerability summary:

  • CVE-2025-5622 (CVSS score 9.8) - Stack-based buffer overflow in wirelessApcli_5g function
  • CVE-2025-5623 (CVSS score 9.8) - Stack-based buffer overflow in qosClassifier function
  • CVE-2025-5624 (CVSS score 9.8) - Stack-based buffer overflow in QoSPortSetup function
  • CVE-2025-5630 (CVSS score 9.8) - Stack-based buffer overflow in form2lansetup.cgi
  • CVE-2025-5620 (CVSS score 7.3) - OS command injection in setipsec_config function
  • CVE-2025-5621 (CVSS score 7.3) - OS command injection in qosClassifier function

The four stack-based buffer overflow vulnerabilities allow attackers to overwrite memory locations and potentially gain complete control over the affected devices. 

The affected router model has reached its End of Life (EOL) and End of Service Life (EOS). This means no security patches or technical support will be provided to address these vulnerabilities.

Successful exploitation of these vulnerabilities could enable attackers to gain full administrative control over affected routers, intercept and manipulate network traffic passing through the devices, deploy malware or establish persistent backdoors for long-term access, and use compromised routers as launching points for attacks against other devices on connected networks. 

D-Link has confirmed that the DIR-816 router reached its End of Life status on November 10, 2023, and will not receive any firmware updates to address these critical vulnerabilities. The company has issued a strong recommendation for all users to immediately retire and replace their DIR-816 routers with current-generation products that maintain active firmware development and customer support. 

Critical flaws reported in end-of-life D-Link DIR-816 routers