D-Link Dsl 3782 Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in D-Link Dsl 3782 Firmware.
By the Year
In 2026 there have been 0 vulnerabilities in D-Link Dsl 3782 Firmware. Last year, in 2025 Dsl 3782 Firmware had 7 security vulnerabilities published. Right now, Dsl 3782 Firmware is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 7 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 2 | 8.80 |
It may take a day or so for new Dsl 3782 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent D-Link Dsl 3782 Firmware Security Vulnerabilities
Buffer Overflow in D-Link DSL-3782 v1.01 (DoS via netmask, gateway params)
CVE-2025-25896
- February 18, 2025
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the destination, netmask, and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
OS Command Injection in D-Link DSL-3782 v1.01 via public_type
CVE-2025-25895
- February 18, 2025
An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the public_type parameter. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet.
D-Link DSL-3782 v1.01 OS Command Injection via samba_wg & samba_nbn
CVE-2025-25894
- February 18, 2025
An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the samba_wg and samba_nbn parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet.
D-Link DSL-3782 v1.01 OS Command Injection via protocol params
CVE-2025-25893
- February 18, 2025
An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the inIP, insPort, inePort, exsPort, exePort, and protocol parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet.
DoS via buffer overflow in D-Link DSL-3782 v1.01 sstartip param
CVE-2025-25892
- February 18, 2025
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the sstartip, sendip, dstartip, and dendip parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
Buffer Overflow in D-Link DSL3782 v1.01 (netmask/dest/gateway)
CVE-2025-25891
- February 18, 2025
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01, triggered by the destination, netmask and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
D-Link DSL-3782 v1.01 Buffer Overflow in ParentalControl.asp
CVE-2024-56914
- January 22, 2025
D-Link DSL-3782 v1.01 is vulnerable to Buffer Overflow in /New_GUI/ParentalControl.asp.
Remote Code Execution via Router IP in D-Link DSL-3782 <=1.03
CVE-2023-44959
8.8 - High
- October 10, 2023
An issue found in D-Link DSL-3782 v.1.03 and before allows remote authenticated users to execute arbitrary code as root via the Router IP Address fields of the network settings page.
Command Injection
Remote Code Exec in D-Link DSL-3782 v1.03 Network Settings Page
CVE-2023-27216
8.8 - High
- April 12, 2023
An issue found in D-Link DSL-3782 v.1.03 allows remote authenticated users to execute arbitrary code as root via the network settings page.
Shell injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for D-Link Dsl 3782 Firmware or by D-Link? Click the Watch button to subscribe.