D-Link Dap 1520 Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in D-Link Dap 1520 Firmware.
By the Year
In 2026 there have been 0 vulnerabilities in D-Link Dap 1520 Firmware. Last year, in 2025 Dap 1520 Firmware had 3 security vulnerabilities published. Right now, Dap 1520 Firmware is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 3 | 9.80 |
| 2024 | 1 | 0.00 |
It may take a day or so for new Dap 1520 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent D-Link Dap 1520 Firmware Security Vulnerabilities
DAP-1520 1.10B04_BETA02 Remote Stack Buffer Overflow via Auth Handler
CVE-2025-4356
9.8 - Critical
- May 06, 2025
A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02. It has been declared as critical. This vulnerability affects the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Memory Corruption
Tenda DAP-1520 1.10B04_BETA02 Heap BOverflow in set_ws_action (API)
CVE-2025-4355
9.8 - Critical
- May 06, 2025
A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02. It has been classified as critical. This affects the function set_ws_action of the file /dws/api/. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Memory Corruption
Stack Buffer Overflow in Tenda DAP-1520 1.10B04_BETA02 – Remote Exploit
CVE-2025-4354
9.8 - Critical
- May 06, 2025
A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02 and classified as critical. Affected by this issue is the function check_dws_cookie of the file /storage. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Memory Corruption
D-Link DAP-1520 REVA_FIRMWARE_1.10B04_BETA02_HOTFIX NULL Pointer Dereference in plugins_call_handle_
CVE-2024-36831
- December 17, 2024
A NULL pointer dereference in the plugins_call_handle_uri_clean function of D-Link DAP-1520 REVA_FIRMWARE_1.10B04_BETA02_HOTFIX allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request without authentication.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for D-Link Dap 1520 Firmware or by D-Link? Click the Watch button to subscribe.