CVE-2026-5213: Stack-based Buffer Overflow in D-Link DNS-120
A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The affected element is the function cgi_adduser_to_session of the file /cgi-bin/account_mgr.cgi. This manipulation of the argument read_list causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2026-5213 is a critical stack-based buffer overflow vulnerability identified in a wide range of D-Link NAS devices, including DNS-120, DNS-315L, DNS-320 series, DNS-323, DNS-340L, DNS-1100-4, DNS-1200-05, and others, up to firmware version 20260205. The vulnerability resides in the cgi_adduser_to_session function of the /cgi-bin/account_mgr.cgi CGI script, which improperly processes the read_list argument. This improper input validation leads to a stack-based buffer overflow, allowing an attacker to overwrite memory on the stack. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. Exploitation could allow attackers to execute arbitrary code with elevated privileges, potentially leading to full device compromise, data theft, or denial of service. The vulnerability has been publicly disclosed, although no confirmed exploits in the wild have been reported yet. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). This combination underscores the critical nature of the vulnerability and the urgency for remediation. The lack of available patches at the time of disclosure increases the risk for organizations relying on these devices for critical storage and network functions.
Potential Impact
The potential impact of CVE-2026-5213 is severe for organizations using affected D-Link NAS devices. Successful exploitation can lead to remote code execution, allowing attackers to gain unauthorized control over the device. This can result in data breaches, including theft or manipulation of sensitive stored data, disruption of network-attached storage services, and potential pivoting into internal networks. The compromise of NAS devices can undermine business continuity, cause significant operational downtime, and damage organizational reputation. Given the devices' role in file sharing and backup, the vulnerability could also facilitate ransomware deployment or persistent espionage. The remote, unauthenticated nature of the exploit increases the attack surface, making large-scale automated attacks feasible. Organizations in sectors relying heavily on NAS for data storage, such as healthcare, finance, government, and SMBs, face heightened risk. The absence of known exploits in the wild currently provides a limited window for proactive mitigation before potential exploitation campaigns emerge.
Mitigation Recommendations
To mitigate CVE-2026-5213 effectively, organizations should: 1) Immediately check for and apply any official firmware updates or patches released by D-Link addressing this vulnerability. 2) If patches are unavailable, restrict access to the affected NAS devices' management interfaces by implementing network segmentation and firewall rules to limit exposure to trusted IP addresses only. 3) Disable or restrict access to the vulnerable CGI scripts, if feasible, or employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the read_list parameter. 4) Monitor network traffic for unusual requests to /cgi-bin/account_mgr.cgi and implement intrusion detection/prevention systems (IDS/IPS) signatures tailored to detect exploitation attempts. 5) Conduct regular security audits and vulnerability scans on NAS devices to identify and remediate configuration weaknesses. 6) Educate IT staff on the risks associated with legacy NAS devices and encourage migration to more secure, updated storage solutions where possible. 7) Maintain robust backup and incident response plans to minimize damage in case of compromise. These targeted actions go beyond generic advice by focusing on access control, monitoring, and compensating controls pending patch availability.
Affected Countries
United States, Germany, United Kingdom, Japan, South Korea, Australia, Canada, France, Brazil, India
CVE-2026-5213: Stack-based Buffer Overflow in D-Link DNS-120
Description
A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The affected element is the function cgi_adduser_to_session of the file /cgi-bin/account_mgr.cgi. This manipulation of the argument read_list causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-5213 is a critical stack-based buffer overflow vulnerability identified in a wide range of D-Link NAS devices, including DNS-120, DNS-315L, DNS-320 series, DNS-323, DNS-340L, DNS-1100-4, DNS-1200-05, and others, up to firmware version 20260205. The vulnerability resides in the cgi_adduser_to_session function of the /cgi-bin/account_mgr.cgi CGI script, which improperly processes the read_list argument. This improper input validation leads to a stack-based buffer overflow, allowing an attacker to overwrite memory on the stack. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it highly dangerous. Exploitation could allow attackers to execute arbitrary code with elevated privileges, potentially leading to full device compromise, data theft, or denial of service. The vulnerability has been publicly disclosed, although no confirmed exploits in the wild have been reported yet. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). This combination underscores the critical nature of the vulnerability and the urgency for remediation. The lack of available patches at the time of disclosure increases the risk for organizations relying on these devices for critical storage and network functions.
Potential Impact
The potential impact of CVE-2026-5213 is severe for organizations using affected D-Link NAS devices. Successful exploitation can lead to remote code execution, allowing attackers to gain unauthorized control over the device. This can result in data breaches, including theft or manipulation of sensitive stored data, disruption of network-attached storage services, and potential pivoting into internal networks. The compromise of NAS devices can undermine business continuity, cause significant operational downtime, and damage organizational reputation. Given the devices' role in file sharing and backup, the vulnerability could also facilitate ransomware deployment or persistent espionage. The remote, unauthenticated nature of the exploit increases the attack surface, making large-scale automated attacks feasible. Organizations in sectors relying heavily on NAS for data storage, such as healthcare, finance, government, and SMBs, face heightened risk. The absence of known exploits in the wild currently provides a limited window for proactive mitigation before potential exploitation campaigns emerge.
Mitigation Recommendations
To mitigate CVE-2026-5213 effectively, organizations should: 1) Immediately check for and apply any official firmware updates or patches released by D-Link addressing this vulnerability. 2) If patches are unavailable, restrict access to the affected NAS devices' management interfaces by implementing network segmentation and firewall rules to limit exposure to trusted IP addresses only. 3) Disable or restrict access to the vulnerable CGI scripts, if feasible, or employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the read_list parameter. 4) Monitor network traffic for unusual requests to /cgi-bin/account_mgr.cgi and implement intrusion detection/prevention systems (IDS/IPS) signatures tailored to detect exploitation attempts. 5) Conduct regular security audits and vulnerability scans on NAS devices to identify and remediate configuration weaknesses. 6) Educate IT staff on the risks associated with legacy NAS devices and encourage migration to more secure, updated storage solutions where possible. 7) Maintain robust backup and incident response plans to minimize damage in case of compromise. These targeted actions go beyond generic advice by focusing on access control, monitoring, and compensating controls pending patch availability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-31T10:29:35.164Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69cc2d39e6bfc5ba1d3ba377
Added to database: 3/31/2026, 8:23:21 PM
Last enriched: 3/31/2026, 8:38:23 PM
Last updated: 3/31/2026, 9:28:49 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.