High severity8.8NVD Advisory· Published Mar 31, 2026· Updated Apr 2, 2026
CVE-2026-5211
CVE-2026-5211
Description
A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This vulnerability affects the function UPnP_AV_Server_Path_Del of the file /cgi-bin/app_mgr.cgi. Executing a manipulation of the argument f_dir can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.
Affected products
20Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_165/165.mdnvdExploitThird Party Advisory
- vuldb.com/submit/780434nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/354347nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/354347/ctinvdPermissions RequiredVDB Entry
- www.dlink.comnvdProduct
News mentions
0No linked articles in our index yet.