High severity8.8NVD Advisory· Published Mar 31, 2026· Updated Apr 2, 2026
CVE-2026-5213
CVE-2026-5213
Description
A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The affected element is the function cgi_adduser_to_session of the file /cgi-bin/account_mgr.cgi. This manipulation of the argument read_list causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Affected products
20Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_168/168.mdnvdExploitThird Party Advisory
- vuldb.com/submit/780437nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/354350nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/354350/ctinvdPermissions RequiredVDB Entry
- www.dlink.comnvdProduct
News mentions
0No linked articles in our index yet.