Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5212: Stack-based Buffer Overflow in D-Link DNS-120

0
High
VulnerabilityCVE-2026-5212cvecve-2026-5212
Published: Tue Mar 31 2026 (03/31/2026, 20:15:13 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DNS-120

Description

CVE-2026-5212 is a high-severity stack-based buffer overflow vulnerability affecting multiple D-Link NAS devices, including the DNS-120 series and others, up to firmware version 20260205. The flaw exists in the Webdav_Upload_File function within /cgi-bin/webdav_mgr. cgi, where improper handling of the f_file argument allows remote attackers to overflow the stack. Exploitation requires no user interaction or authentication and can lead to full compromise of the affected device. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability of the devices. Organizations using these D-Link NAS products should prioritize patching or applying mitigations to prevent remote code execution or denial of service. Countries with significant deployments of D-Link NAS devices and strategic reliance on network-attached storage are at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:38:36 UTC

Technical Analysis

CVE-2026-5212 is a stack-based buffer overflow vulnerability identified in a broad range of D-Link NAS devices, including DNS-120, DNS-320, DNS-323, DNS-340L, DNS-1100-4, and others, up to firmware version 20260205. The vulnerability resides in the Webdav_Upload_File function of the /cgi-bin/webdav_mgr.cgi CGI script, which handles WebDAV file uploads. Specifically, the vulnerability arises from improper validation and handling of the f_file argument, allowing an attacker to supply a crafted input that overflows the stack buffer. This overflow can corrupt the stack, potentially enabling remote code execution or causing a denial of service by crashing the device. The attack vector is remote network access with no authentication or user interaction required, making exploitation feasible over the internet or internal networks. The CVSS v4.0 score is 8.7 (high severity), reflecting the ease of exploitation (network attack vector, no privileges or user interaction needed) and the high impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of active exploitation attempts. The affected devices are commonly used in small to medium business and home environments for network-attached storage, making them attractive targets for attackers seeking to compromise data or disrupt operations.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary code or cause denial of service on affected D-Link NAS devices. Successful exploitation can lead to full compromise of the device, including unauthorized access to stored data, manipulation or deletion of files, and disruption of network storage services. This can severely impact organizations relying on these devices for critical data storage, backup, or file sharing. Confidentiality is at risk due to potential data exposure, integrity is compromised by possible unauthorized modification or deletion of files, and availability can be disrupted by device crashes or persistent compromise. The lack of authentication requirement and remote exploitability increases the threat level, especially for devices exposed to untrusted networks or the internet. Organizations may face data loss, operational downtime, and potential lateral movement by attackers within internal networks.

Mitigation Recommendations

1. Immediately check for and apply any official firmware updates or patches released by D-Link addressing CVE-2026-5212. 2. If patches are not yet available, disable or restrict access to the WebDAV service (/cgi-bin/webdav_mgr.cgi) on affected devices, especially from untrusted networks. 3. Implement network segmentation and firewall rules to limit access to NAS devices only to trusted internal networks or authorized users. 4. Monitor network traffic for unusual WebDAV upload activity or malformed requests targeting the f_file parameter. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for buffer overflow attempts against D-Link NAS devices. 6. Regularly audit device configurations and logs for signs of compromise or exploitation attempts. 7. Consider replacing legacy or unsupported devices with newer models that receive timely security updates. 8. Educate IT staff about this vulnerability and ensure incident response plans include steps for NAS device compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-31T10:29:30.918Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cc2d39e6bfc5ba1d3ba36f

Added to database: 3/31/2026, 8:23:21 PM

Last enriched: 3/31/2026, 8:38:36 PM

Last updated: 3/31/2026, 9:28:48 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses