


Perceptive Security
SOC/SIEM Consultancy

A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-…
Published:
15 maart 2026 om 23:00:00
Alert date:
16 maart 2026 om 16:21:26
Source:
nvd.nist.gov
Network Infrastructure, Mobile & IoT
A stack-based buffer overflow vulnerability affects multiple D-Link NAS devices including DNS-120, DNR-202L, DNS-315L, DNS-320 series, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to version 20260205. The vulnerability exists in the UPnP_AV_Server_Path_Setting function of /cgi-bin/app_mgr.cgi file. Remote attackers can exploit this vulnerability to cause buffer overflow through manipulation. An exploit has been published and is publicly available, making this a high-risk vulnerability requiring immediate patching.
Technical details
Mitigation steps:
Affected products:
D-Link DNS-120
D-Link DNR-202L
D-Link DNS-315L
D-Link DNS-320
D-Link DNS-320L
D-Link DNS-320LW
D-Link DNS-321
D-Link DNR-322L
D-Link DNS-323
D-Link DNS-325
D-Link DNS-326
D-Link DNS-327L
D-Link DNR-326
D-Link DNS-340L
D-Link DNS-343
D-Link DNS-345
D-Link DNS-726-4
D-Link DNS-1100-4
D-Link DNS-1200-05
D-Link DNS-1550-04
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-4214
https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_164/164.md
https://vuldb.com/?ctiid.351125
https://vuldb.com/?id.351125
https://vuldb.com/?submit.770445
https://www.dlink.com/
Related CVE's:
Related threat actors:
IOC's:
/cgi-bin/app_mgr.cgi
This article was created with the assistance of AI technology by Perceptive.
