Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5214: Stack-based Buffer Overflow in D-Link DNS-120

0
High
VulnerabilityCVE-2026-5214cvecve-2026-5214
Published: Tue Mar 31 2026 (03/31/2026, 21:15:14 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DNS-120

Description

CVE-2026-5214 is a high-severity stack-based buffer overflow vulnerability affecting multiple D-Link NAS devices, including the DNS-120 series and others, up to firmware version 20260205. The flaw exists in the cgi_addgroup_get_group_quota_minsize function within /cgi-bin/account_mgr. cgi, where improper handling of the 'Name' argument allows remote attackers to overflow the stack. Exploitation requires no user interaction and can be performed remotely without authentication, potentially leading to full system compromise. Although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of active attacks. The vulnerability impacts confidentiality, integrity, and availability with high severity (CVSS 8. 7). Organizations using affected D-Link NAS devices should prioritize patching or apply mitigations to prevent exploitation. Countries with significant deployments of these devices, including the United States, Germany, Japan, South Korea, and Australia, are at elevated risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 21:38:23 UTC

Technical Analysis

CVE-2026-5214 is a critical stack-based buffer overflow vulnerability identified in a broad range of D-Link NAS devices, including DNS-120, DNS-320 series, DNS-340L, DNS-1100-4, and others, up to firmware version 20260205. The vulnerability resides in the cgi_addgroup_get_group_quota_minsize function of the /cgi-bin/account_mgr.cgi script, which improperly processes the 'Name' parameter. An attacker can craft a malicious request that manipulates this argument to overflow the stack buffer, potentially overwriting the return address or other control data. This flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation could allow arbitrary code execution with elevated privileges, leading to full compromise of the NAS device. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact on confidentiality, integrity, and availability. Although no active exploits have been observed in the wild, a public exploit has been disclosed, increasing the likelihood of exploitation attempts. The affected devices are commonly used in enterprise and small-to-medium business environments for network-attached storage, making them attractive targets for attackers seeking to disrupt operations or exfiltrate sensitive data. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts to reduce risk.

Potential Impact

The impact of CVE-2026-5214 is significant for organizations relying on affected D-Link NAS devices. Exploitation can lead to arbitrary code execution, allowing attackers to gain full control over the device. This can result in unauthorized access to stored data, disruption of file sharing services, and potential use of the compromised device as a pivot point for further network intrusion. Confidentiality is at risk due to possible data theft, integrity can be compromised by unauthorized modification or deletion of files, and availability may be affected through device crashes or denial-of-service conditions. Given the remote, unauthenticated nature of the exploit, attackers can launch attacks from anywhere, increasing the threat surface. Organizations may face operational downtime, data breaches, and reputational damage. The public availability of an exploit further elevates the risk of widespread attacks, especially targeting environments where patching is delayed or devices are exposed to the internet.

Mitigation Recommendations

To mitigate CVE-2026-5214, organizations should immediately verify if their D-Link NAS devices are among the affected models and firmware versions. If vendor patches or firmware updates become available, they must be applied promptly. In the absence of patches, network-level mitigations should be implemented, including restricting access to the management interface (/cgi-bin/account_mgr.cgi) via firewall rules or VPN-only access to limit exposure. Disabling unnecessary remote management features can reduce the attack surface. Monitoring network traffic for unusual requests targeting the vulnerable CGI endpoint can help detect exploitation attempts. Employing intrusion detection/prevention systems with updated signatures for this vulnerability is recommended. Regular backups of NAS data should be maintained to enable recovery in case of compromise. Additionally, organizations should review and harden NAS device configurations, disable unused services, and ensure strong authentication mechanisms are in place to prevent lateral movement if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-31T10:29:38.215Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cc3b45e6bfc5ba1d430ca3

Added to database: 3/31/2026, 9:23:17 PM

Last enriched: 3/31/2026, 9:38:23 PM

Last updated: 3/31/2026, 10:30:25 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses