PT-2026-29268 · D Link · D-Link Dns-320+16

Ziyue Xie

·

Published

2026-03-31

·

Updated

2026-03-31

·

CVE-2026-5213

CVSS v2.0

9.0

High

AV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions D-Link DNS-120 versions prior to 20260205 D-Link DNR-202L versions prior to 20260205 D-Link DNS-315L versions prior to 20260205 D-Link DNS-320 versions prior to 20260205 D-Link DNS-320L versions prior to 20260205 D-Link DNS-320LW versions prior to 20260205 D-Link DNS-321 versions prior to 20260205 D-Link DNR-322L versions prior to 20260205 D-Link DNS-323 versions prior to 20260205 D-Link DNS-325 versions prior to 20260205 D-Link DNS-326 versions prior to 20260205 D-Link DNS-327L versions prior to 20260205 D-Link DNR-326 versions prior to 20260205 D-Link DNS-340L versions prior to 20260205 D-Link DNS-343 versions prior to 20260205 D-Link DNS-345 versions prior to 20260205 D-Link DNS-726-4 versions prior to 20260205 D-Link DNS-1100-4 versions prior to 20260205 D-Link DNS-1200-05 versions prior to 20260205 D-Link DNS-1550-04 versions prior to 20260205
Description A flaw exists that allows for remote manipulation of the read list argument within the cgi adduser to session function located in the /cgi-bin/account mgr.cgi file. This manipulation can lead to a stack-based buffer overflow. The exploit for this issue has been publicly disclosed.
Recommendations D-Link DNS-120 versions prior to 20260205 should be updated. D-Link DNR-202L versions prior to 20260205 should be updated. D-Link DNS-315L versions prior to 20260205 should be updated. D-Link DNS-320 versions prior to 20260205 should be updated. D-Link DNS-320L versions prior to 20260205 should be updated. D-Link DNS-320LW versions prior to 20260205 should be updated. D-Link DNS-321 versions prior to 20260205 should be updated. D-Link DNR-322L versions prior to 20260205 should be updated. D-Link DNS-323 versions prior to 20260205 should be updated. D-Link DNS-325 versions prior to 20260205 should be updated. D-Link DNS-326 versions prior to 20260205 should be updated. D-Link DNS-327L versions prior to 20260205 should be updated. D-Link DNR-326 versions prior to 20260205 should be updated. D-Link DNS-340L versions prior to 20260205 should be updated. D-Link DNS-343 versions prior to 20260205 should be updated. D-Link DNS-345 versions prior to 20260205 should be updated. D-Link DNS-726-4 versions prior to 20260205 should be updated. D-Link DNS-1100-4 versions prior to 20260205 should be updated. D-Link DNS-1200-05 versions prior to 20260205 should be updated. D-Link DNS-1550-04 versions prior to 20260205 should be updated.

Exploit

Fix

Stack Overflow

Buffer Overflow

Weakness Enumeration

Related Identifiers

CVE-2026-5213

Affected Products

D-Link Dnr-202L
D-Link Dnr-322L
D-Link Dns-326
D-Link Dns-1100-4
D-Link Dns-120
D-Link Dns-1200-05
D-Link Dns-1550-04
D-Link Dns-315L
D-Link Dns-320
D-Link Dns-321
D-Link Dns-323
D-Link Dns-325
D-Link Dns-327L
D-Link Dns-340L
D-Link Dns-343
D-Link Dns-345
D-Link Dns-726-4