D-Link Dwl 2600ap Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in D-Link Dwl 2600ap Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in D-Link Dwl 2600ap Firmware. Dwl 2600ap Firmware did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 1 7.80
2022 0 0.00
2021 0 0.00
2020 1 7.80

It may take a day or so for new Dwl 2600ap Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent D-Link Dwl 2600ap Firmware Security Vulnerabilities

Command Injection in Firmware_Update via Telnet Priv Esc
CVE-2023-0127 7.8 - High - February 11, 2023

A command injection vulnerability in the firmware_update command, in the device's restricted telnet interface, allows an authenticated attacker to execute arbitrary commands as root.

Command Injection

D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability
CVE-2019-20500 7.8 - High - March 05, 2020

D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter.

Shell injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for D-Link Dwl 2600ap Firmware or by D-Link? Click the Watch button to subscribe.

 

D-Link
Vendor

 
subscribe