PT-2026-25592 · D Link · Dnr-202L+18
Pjqwudi
·
Published
2026-03-16
·
Updated
2026-03-16
·
CVE-2026-4212
CVSS v2.0
9.0
| Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
D-Link DNS-1550-04 download mgr.cgi Downloads Schedule Info stack-based overflow
CVE: CVE-2026-4212
Vendor: D-link
Product: DNS-120
CVSS: 8.7
Credits: pjqwudi (VulDB User)
Description:
A security vulnerability has been detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This affects the function Downloads Schedule Info of the file /cgi-bin/download mgr.cgi. Such manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
References:
• https://t.co/iI5OmvQkVq
• https://t.co/zH5LlJkdrw
• https://t.co/nV1HStdHD4
• https://t.co/ltvToLk3T6
• https://t.co/thGipzvBU0
• https://t.co/ivXm3DCcDT
#dbugs vuln
Exploit
Fix
Stack Overflow
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Dnr-202L
Dnr-322L
Dnr-326
Dns-1100-4
Dns-120
Dns-1200-05
Dns-1550-04
Dns-315L
Dns-320
Dns-320L
Dns-321
Dns-323
Dns-325
Dns-326
Dns-327L
Dns-340L
Dns-343
Dns-345
Dns-726-4