Dlink

Dap-1620 Firmware

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.35%
  • Published 22.03.2025 16:31:05
  • Last modified 26.03.2025 18:43:08

A vulnerability was found in D-Link DAP-1620 1.03 and classified as critical. This issue affects the function check_dws_cookie of the file /storage. The manipulation of the argument uid leads to stack-based buffer overflow. The attack may be initiate...

Exploit
  • EPSS 33.74%
  • Published 22.03.2025 14:31:05
  • Last modified 26.03.2025 18:44:24

A vulnerability has been found in D-Link DAP-1620 1.03 and classified as critical. This vulnerability affects the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. The manipulation leads to stack-based ...

Exploit
  • EPSS 0.35%
  • Published 22.03.2025 14:15:16
  • Last modified 26.03.2025 18:46:06

A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possib...

Exploit
  • EPSS 0.35%
  • Published 22.03.2025 13:31:05
  • Last modified 26.03.2025 18:48:51

A vulnerability, which was classified as critical, has been found in D-Link DAP-1620 1.03. Affected by this issue is the function set_ws_action of the file /dws/api/ of the component Path Handler. The manipulation leads to heap-based buffer overflow....

Exploit
  • EPSS 90.5%
  • Published 04.03.2022 16:15:09
  • Last modified 21.11.2024 06:34:00

Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].