Lucene search

K
DlinkDap-1520 Firmware

5 matches found

CVE
CVE
added 2025/05/06 1:15 p.m.49 views

CVE-2025-4354

A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02 and classified as critical. Affected by this issue is the function check_dws_cookie of the file /storage. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the publ...

9.8CVSS8.8AI score0.00088EPSS
CVE
CVE
added 2025/05/06 1:15 p.m.49 views

CVE-2025-4355

A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02. It has been classified as critical. This affects the function set_ws_action of the file /dws/api/. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the ...

9.8CVSS8.9AI score0.00088EPSS
CVE
CVE
added 2024/12/17 3:15 p.m.48 views

CVE-2024-36831

A NULL pointer dereference in the plugins_call_handle_uri_clean function of D-Link DAP-1520 REVA_FIRMWARE_1.10B04_BETA02_HOTFIX allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request without authentication.

5.3CVSS6.4AI score0.00126EPSS
CVE
CVE
added 2025/05/06 2:15 p.m.48 views

CVE-2025-4356

A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02. It has been declared as critical. This vulnerability affects the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. The manipulation leads to stack-based buffer overflow. The attack can be ini...

9.8CVSS8.9AI score0.00106EPSS
CVE
CVE
added 2020/07/22 7:15 p.m.42 views

CVE-2020-15892

An issue was discovered in apply.cgi on D-Link DAP-1520 devices before 1.10b04Beta02. Whenever a user performs a login action from the web interface, the request values are being forwarded to the ssi binary. On the login page, the web interface restricts the password input field to a fixed length o...

9.8CVSS9.5AI score0.00922EPSS