High severity8.8NVD Advisory· Published Mar 31, 2026· Updated Apr 2, 2026
CVE-2026-5214
CVE-2026-5214
Description
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Impacted is the function cgi_addgroup_get_group_quota_minsize of the file /cgi-bin/account_mgr.cgi. The manipulation of the argument Name results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.
Affected products
20Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_169/169.mdnvdExploitThird Party Advisory
- vuldb.com/submit/780439nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/354349nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/354349/ctinvdPermissions RequiredVDB Entry
- www.dlink.comnvdProduct
News mentions
0No linked articles in our index yet.