PT-2026-25566 · D Link · Dnr-202L+38
Pjq123
·
Published
2026-03-15
·
Updated
2026-03-16
·
CVE-2026-4214
CVSS v3.1
9.8
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
D-Link DNS-1550-04 app mgr.cgi UPnP AV Server Path Setting stack-based overflow
CVE: CVE-2026-4214
PT-Identifier: PT-2026-25566
Vendor: D-link
Product: DNS-120
CVSS: 8.7
Credits: pjq123 (VulDB User)
Description:
A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This issue affects the function UPnP AV Server Path Setting of the file /cgi-bin/app mgr.cgi. Executing a manipulation can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.
References:
• https://t.co/nQqLjWytQu
• https://t.co/N9vAz6nLqW
• https://t.co/NLGoDG68Re
• https://t.co/AACAdwpWYP
• https://t.co/98b0vU5wPz
• https://t.co/ivXm3DCcDT
#dbugs vuln
Exploit
Fix
Stack Overflow
Buffer Overflow
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Dnr-202L
Dnr-322L
Dnr-326
Dns-1100-4
Dns-120
Dns-1200-05
Dns-1550-04
Dns-315L
Dns-320
Dns-320L
Dns-321
Dns-323
Dns-325
Dns-326
Dns-327L
Dns-340L
Dns-343
Dns-345
Dns-726-4
Dnr-202L Firmware
Dnr-326 Firmware
Dns-1100-4 Firmware
Dns-1200-05 Firmware
Dns-120 Firmware
Dns-1550-04 Firmware
Dns-315L Firmware
Dns-320 Firmware
Dns-320L Firmware
Dns-320Lw Firmware
Dns-321 Firmware
Dns-322L Firmware
Dns-323 Firmware
Dns-325 Firmware
Dns-326 Firmware
Dns-327L Firmware
Dns-340L Firmware
Dns-343 Firmware
Dns-345 Firmware
Dns-726-4 Firmware