D-Link Dsl 2740r Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in D-Link Dsl 2740r Firmware.

By the Year

In 2026 there have been 1 vulnerability in D-Link Dsl 2740r Firmware. Dsl 2740r Firmware did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2026 as compared to last year.

Year Vulnerabilities Average Score
2026 1 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 1 7.50

It may take a day or so for new Dsl 2740r Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent D-Link Dsl 2740r Firmware Security Vulnerabilities

D-Link dnscfg.cgi Auth Bypass in DSL/DIR/DNS Router
CVE-2026-0625 - January 05, 2026

Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality. By directly requesting this endpoint, an attacker can modify the devices DNS settings without valid credentials, enabling DNS hijacking (DNSChanger) attacks that redirect user traffic to attacker-controlled infrastructure. In 2019, D-Link reported that this behavior was leveraged by the "GhostDNS" malware ecosystem targeting consumer and carrier routers. All impacted products were subsequently designated end-of-life/end-of-service, and no longer receive security updates. Exploitation evidence was observed by the Shadowserver Foundation on 2025-11-27 (UTC).

Missing Authentication for Critical Function

Null Pointer Dereference vulnerability exists in D-Link DSL-2740R UK_1.01, which could let a remove malicious user cause a denial of service
CVE-2021-29294 7.5 - High - August 10, 2021

Null Pointer Dereference vulnerability exists in D-Link DSL-2740R UK_1.01, which could let a remove malicious user cause a denial of service via the send_hnap_unauthorized function. It could be triggered by sending crafted POST request to /HNAP1/. NOTE: The DSL-2740R and all hardware revisions are considered End of Life and as such this issue will not be patched

NULL Pointer Dereference

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for D-Link Dsl 2740r Firmware or by D-Link? Click the Watch button to subscribe.

 

D-Link
Vendor

 
subscribe