top of page
perceptive_background_267k.jpg

A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-…

Published:

30 maart 2026 om 22:00:00

Alert date:

31 maart 2026 om 22:03:20

Source:

nvd.nist.gov

Click to open the original link from this advisory

Network Infrastructure, Mobile & IoT

A stack-based buffer overflow vulnerability (CVE-2026-5212) has been discovered in multiple D-Link network devices including DNS and DNR series models up to version 20260205. The vulnerability affects the Webdav_Upload_File function in /cgi-bin/webdav_mgr.cgi through manipulation of the f_file argument. This security flaw can be exploited remotely and public exploits are available. The vulnerability impacts over 20 different D-Link device models including DNS-120, DNS-320 series, DNS-1100-4, and others. Given the remote exploitation capability and public disclosure of exploits, this represents a significant security risk for affected D-Link infrastructure devices.

Technical details

Mitigation steps:

Affected products:

D-Link DNS-120
D-Link DNR-202L
D-Link DNS-315L
D-Link DNS-320
D-Link DNS-320L
D-Link DNS-320LW
D-Link DNS-321
D-Link DNR-322L
D-Link DNS-323
D-Link DNS-325
D-Link DNS-326
D-Link DNS-327L
D-Link DNR-326
D-Link DNS-340L
D-Link DNS-343
D-Link DNS-345
D-Link DNS-726-4
D-Link DNS-1100-4
D-Link DNS-1200-05
D-Link DNS-1550-04

Related links:

Related CVE's:

Related threat actors:

IOC's:

/cgi-bin/webdav_mgr.cgi

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page