D-Link Dap 1620 Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in D-Link Dap 1620 Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in D-Link Dap 1620 Firmware. Last year, in 2025 Dap 1620 Firmware had 4 security vulnerabilities published. Right now, Dap 1620 Firmware is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 4 9.80

It may take a day or so for new Dap 1620 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent D-Link Dap 1620 Firmware Security Vulnerabilities

Stack Buffer Overflow in D-Link DAP-1620 1.03 via check_dws_cookie(uid)
CVE-2025-2621 9.8 - Critical - March 22, 2025

A vulnerability was found in D-Link DAP-1620 1.03 and classified as critical. This issue affects the function check_dws_cookie of the file /storage. The manipulation of the argument uid leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Memory Corruption

D-Link DAP-1620 1.03 Remote Buf Overflow via Auth mod_graph_auth_uri_handler
CVE-2025-2620 9.8 - Critical - March 22, 2025

A vulnerability has been found in D-Link DAP-1620 1.03 and classified as critical. This vulnerability affects the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Memory Corruption

D-Link DAP-1620 1.03 Remote Stack Buffer Overflow in Cookie Handler
CVE-2025-2619 9.8 - Critical - March 22, 2025

A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Memory Corruption

D-Link DAP-1620 1.03 Remote Heap Overflow in Path Handler
CVE-2025-2618 9.8 - Critical - March 22, 2025

A vulnerability, which was classified as critical, has been found in D-Link DAP-1620 1.03. Affected by this issue is the function set_ws_action of the file /dws/api/ of the component Path Handler. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Memory Corruption

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for D-Link Dap 1620 Firmware or by D-Link? Click the Watch button to subscribe.

 

D-Link
Vendor

 
subscribe