Release notes updated.
Interesting: The only vulnerabilities listed in these release notes that were not already listed in the previous release notes for Build 10 (dated 06/11/2013) are the three fixes for "Buffer overflow" and the three for "(CSRF)."
I don't see the "Michael Messner/D-Link UPnP OS Command Injection" vulnerability listed even though Build 11 supposedly fixes it -- see http://www.exploit-download.com/search/cgi/96. Another vulnerability reported fixed in the same site but not listed in the release is "m-1-k-3/Multiple D-Link Devices - OS-Command Injection via UPnP Interface".. (I don't allow UPnP, so this isn't really an issue for me.)
Of potentially more concern (apparently -- I don't really understand the jargon) is the statement, also on the same site, "D-Link devices DIR-300 rev B, DIR-600 rev B, DIR-645, DIR-845, and DIR-865 suffer from a remote command injection vulnerability. The vulnerability is caused due to missing input validation in different XML parameters." This is not reported as fixed, as far as I can tell.
There's another reference at http://www.osvdb.org/show/osvdb/94924 that might be describing one or more of the above and reports that Build 11 solves the problem.
Anyhow it appears worthwhile to flash the new build. Agreed? Or can you help clarify the issues?