Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4529: Stack-based Buffer Overflow in D-Link DHP-1320

0
High
VulnerabilityCVE-2026-4529cvecve-2026-4529
Published: Sat Mar 21 2026 (03/21/2026, 23:02:14 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DHP-1320

Description

A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 23:31:03 UTC

Technical Analysis

CVE-2026-4529 identifies a critical stack-based buffer overflow vulnerability in the D-Link DHP-1320 device, firmware version 1.00WWB04. The vulnerability resides in the SOAP Handler component, specifically within the redirect_count_down_page function, where improper input validation allows an attacker to overflow the stack buffer. This flaw can be triggered remotely over the network without requiring authentication or user interaction, making it highly exploitable. The overflow can lead to arbitrary code execution, allowing attackers to execute malicious payloads with the privileges of the affected device’s software. The device is a network powerline adapter commonly used to extend wired network connectivity over electrical wiring. Despite the exploit being publicly available, the product is no longer supported by D-Link, and no official patches or firmware updates exist to remediate the issue. The CVSS 4.0 score of 8.7 reflects the vulnerability’s high impact on confidentiality, integrity, and availability, with low attack complexity and no required privileges or user interaction. The vulnerability’s presence in an unsupported device increases risk, as organizations may continue using it without mitigation options. This vulnerability could be leveraged in targeted attacks or as part of larger network compromise campaigns.

Potential Impact

The impact of CVE-2026-4529 is significant for organizations still deploying the D-Link DHP-1320 device. Exploitation can lead to full compromise of the affected device, enabling attackers to execute arbitrary code remotely. This can result in unauthorized access to network segments, interception or manipulation of network traffic, and potential pivoting to other internal systems. The loss of confidentiality, integrity, and availability of network communications poses risks to business operations, data security, and network stability. Since the device is often used to extend network connectivity, its compromise could undermine network segmentation and security controls. The lack of vendor support and patches increases the likelihood of exploitation over time, especially as public exploits are available. Organizations relying on this device in critical infrastructure or sensitive environments face elevated risks of disruption and data breaches.

Mitigation Recommendations

Given the absence of official patches due to end-of-life status, organizations should prioritize immediate mitigation strategies. First, identify and inventory all D-Link DHP-1320 devices running version 1.00WWB04 within the network. Where possible, isolate these devices on segmented network zones with strict access controls to limit exposure. Disable or restrict SOAP services or any remote management interfaces if feasible. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts targeting the SOAP Handler. Consider deploying firewall rules to block external access to the device’s management ports. If replacement is viable, phase out the affected devices and upgrade to supported hardware with active security updates. For environments where replacement is not immediately possible, implement strict monitoring and logging to detect anomalous activity related to these devices. Additionally, educate network administrators about the risks and signs of exploitation to enable rapid incident response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-21T07:42:09.435Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bf26a7f4197a8e3b098306

Added to database: 3/21/2026, 11:15:51 PM

Last enriched: 3/21/2026, 11:31:03 PM

Last updated: 3/22/2026, 1:38:46 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses