D-Link DIR-605L Multiple Vulnerabilities (2021-2025) CVE-2021-40655CVE-2023-24343CVE-2023-24344CVE-2023-24345CVE-2023-24346CVE-2023-24347CVE-2023-24348CVE-2023-24349CVE-2023-24350CVE-2023-24351CVE-2023-24352CVE-2024-9532CVE-2024-9533CVE-2024-9534CVE-2024-9535CVE-2024-9549CVE-2024-9550CVE-2024-9551CVE-2024-9552CVE-2024-9553CVE-2024-9555CVE-2024-9556CVE-2024-9557CVE-2024-9558CVE-2024-9559CVE-2024-9561CVE-2024-9562CVE-2024-9563CVE-2024-9564CVE-2024-9565CVE-2024-11959CVE-2024-11960CVE-2024-37630CVE-2025-2546CVE-2025-2547CVE-2025-2548CVE-2025-2549CVE-2025-2550CVE-2025-2551CVE-2025-2552CVE-2025-2553CVE-2025-4441CVE-2025-4442CVE-2025-4443CVE-2025-4445
- Severity
- Vulnerability description
- Not available
- Risk description
- Not available
- Recommendation
- Not available
- References
- https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/01https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/01https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/03https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/02https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/02https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/02https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/04https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/03https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/01https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/03https://github.com/abcdefg-png/IoT-vulnerable/tree/main/D-Link/DIR-605Lhttps://github.com/offshore0315/loT-vulnerable/blob/main/D-Link/formResetStatistic.mdhttps://github.com/offshore0315/loT-vulnerable/blob/main/D-Link/formSetPortTr.mdhttps://github.com/Ilovewomen/D-LINK-DIR-605/https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/D-link/DIR-605L/README.mdhttps://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formAdvFirewall-1b153a41781f80aca28ec11da787f0e8?pvs=4https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formAdvNetwork-1b153a41781f80109325dbc96ffc0295?pvs=4https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formSetDomainFilter-1b153a41781f80498fcdf9d675df9b39?pvs=4https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formSetPassword-1b153a41781f803d8166f9b551b30cd4?pvs=4https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formSetDDNS-1b153a41781f80feb80bd24afc8f83d5?pvs=4https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formSetPortTr-1b153a41781f809d95c8e39c6c31c348?pvs=4https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formTcpipSetup-1b153a41781f80a7967ae08c81147a39?pvs=4https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formVirtualServ-1b153a41781f80b98645c3f7f4c5f4ae?pvs=4https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10393https://support.dlink.com/ProductInfo.aspx?m=DIR-605Lhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Codename
- Not available
- Detectable with
- Network Scanner
- Scan engine
- OpenVAS
- Cisa Kev
Yes
- Exploitable with Sniper
- No
- CVE Published
- Not available
- Detection added at
- Software Type
- Not available
- Vendor
- Not available
- Product
- Not available
Detect & validate this vulnerability
Go beyond surface scans. Get real validation with proprietary tools designed to prove what’s exploitable in your environment.