D-Link Go Rt Ac750 Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in D-Link Go Rt Ac750 Firmware.
By the Year
In 2026 there have been 0 vulnerabilities in D-Link Go Rt Ac750 Firmware. Go Rt Ac750 Firmware did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 5 | 9.80 |
| 2023 | 3 | 9.80 |
| 2022 | 3 | 9.80 |
It may take a day or so for new Go Rt Ac750 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent D-Link Go Rt Ac750 Firmware Security Vulnerabilities
Stack Buffer Overflow in hnap_main of D-Link Go-RT-AC750
CVE-2024-27683
- April 11, 2024
D-Link Go-RT-AC750 GORTAC750_A1_FW_v101b03 contains a stack-based buffer overflow via the function hnap_main. An attacker can send a POST request to trigger the vulnerablilify.
D-Link GORTAC750 XSS via dlapn.cgi Parameter Injection
CVE-2024-27684
- March 04, 2024
A Cross-site scripting (XSS) vulnerability in dlapn.cgi, dldongle.cgi, dlcfg.cgi, fwup.cgi and seama.cgi in D-Link GORTAC750_A1_FW_v101b03 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
Stack Buffer Overflow in D-Link Go-RT-AC750 genacgi_main enables Telnet
CVE-2024-22852
9.8 - Critical
- February 06, 2024
D-Link Go-RT-AC750 GORTAC750_A1_FW_v101b03 contains a stack-based buffer overflow via the function genacgi_main. This vulnerability allows attackers to enable telnet service via a specially crafted payload.
Memory Corruption
Hardcoded Alphanetworks password allows root via Telnet on D-Link Go-RT-AC750
CVE-2024-22853
9.8 - Critical
- February 06, 2024
D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 has a hardcoded password for the Alphanetworks account, which allows remote attackers to obtain root access via a telnet session.
Use of Hard-coded Credentials
D-LINK Go-RT-AC750: sprintf Stack Overflow in cgibin
CVE-2024-22916
9.8 - Critical
- January 16, 2024
In D-LINK Go-RT-AC750 v101b03, the sprintf function in the sub_40E700 function within the cgibin is susceptible to stack overflow.
Memory Corruption
D-Link Go-RT-AC750 cmd injection via hedwig.cgi service parameter
CVE-2023-48842
9.8 - Critical
- December 01, 2023
D-Link Go-RT-AC750 revA_v101b03 was discovered to contain a command injection vulnerability via the service parameter at hedwig.cgi.
Command Injection
Genacgi_main Service Param Command Injection in D-Link Go-RT-AC750
CVE-2023-34800
9.8 - Critical
- June 15, 2023
D-Link Go-RT-AC750 revA_v101b03 was discovered to contain a command injection vulnerability via the service parameter at genacgi_main.
Shell injection
D-Link Go-RT-AC750 cmd injection via soapcgi.service param
CVE-2023-26822
9.8 - Critical
- April 01, 2023
D-Link Go-RT-AC750 revA_v101b03 was discovered to contain a command injection vulnerability via the service parameter at soapcgi.main.
Command Injection
D-Link GO-RT-AC750: Command Injection via /cgibin & hnap_main
CVE-2022-37056
9.8 - Critical
- August 28, 2022
D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main,
Shell injection
D-Link Go-RT-AC750 Buffer Overflow via cgibin, hnap_main
CVE-2022-37055
9.8 - Critical
- August 28, 2022
D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Buffer Overflow via cgibin, hnap_main,
Classic Buffer Overflow
D-Link Go-RT-AC750 Command Injection via cgibin, ssdpcgi_main
CVE-2022-37057
9.8 - Critical
- August 28, 2022
D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Command Injection via cgibin, ssdpcgi_main.
Shell injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for D-Link Go Rt Ac750 Firmware or by D-Link? Click the Watch button to subscribe.