Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5312: Improper Access Controls in D-Link DNS-120

0
Medium
VulnerabilityCVE-2026-5312cvecve-2026-5312
Published: Wed Apr 01 2026 (04/01/2026, 20:30:15 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DNS-120

Description

CVE-2026-5312 is a medium severity vulnerability affecting multiple D-Link NAS devices, including the DNS-120 and related models. The flaw resides in improper access controls within several functions of the /cgi-bin/dsk_mgr. cgi file, allowing remote attackers to manipulate device operations without authentication or user interaction. Exploitation can lead to unauthorized access to device management functions related to disk and RAID management. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating moderate risk. Although no known exploits are currently active in the wild, a public exploit is available, increasing the risk of future attacks. The affected devices are commonly used for network-attached storage in small to medium businesses and home environments. Organizations using these D-Link NAS devices should prioritize patching or applying mitigations to prevent unauthorized remote control of critical storage functions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:08:47 UTC

Technical Analysis

CVE-2026-5312 identifies a security weakness in a broad range of D-Link NAS devices, including DNS-120, DNS-320 series, DNS-323, DNS-325, DNS-326, DNS-327L, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05, and DNS-1550-04 running firmware up to version 20260205. The vulnerability is due to improper access controls in multiple functions within the /cgi-bin/dsk_mgr.cgi CGI script, which handles disk management operations such as restarting services, retrieving disk status, scanning disks, volume mapping, RAID type queries, and rebuild information. These functions can be manipulated remotely without requiring authentication, user interaction, or privileges, enabling an attacker to perform unauthorized operations on the device. The flaw stems from insufficient validation of access rights before executing sensitive disk management commands. The vulnerability has a CVSS 4.0 score of 6.9, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on availability but potential impact on integrity due to unauthorized control over storage functions. Although no active exploitation has been reported, a public exploit is available, increasing the likelihood of exploitation attempts. This vulnerability could allow attackers to disrupt storage services, manipulate RAID configurations, or gain further foothold within affected networks. The affected devices are widely deployed in small and medium business environments and home networks, often serving as critical storage infrastructure. The lack of authentication requirement and remote exploitability make this vulnerability particularly concerning for exposed devices.

Potential Impact

The improper access control vulnerability in D-Link NAS devices can lead to unauthorized remote manipulation of critical disk and RAID management functions. This can result in disruption of storage services, data integrity compromise through unauthorized RAID reconfiguration or disk scans, and potential data loss or corruption. Attackers could leverage this access to further penetrate internal networks or disrupt business operations relying on these NAS devices. Organizations using these devices without proper network segmentation or access controls are at risk of service outages and data breaches. The availability of a public exploit increases the risk of widespread attacks, especially against devices exposed to the internet or poorly secured internal networks. The impact is particularly significant for small and medium enterprises and home users who rely on these devices for essential data storage and backup. The vulnerability does not require authentication or user interaction, making it easier to exploit and increasing the potential attack surface. However, the impact is limited to the affected NAS devices and does not directly compromise broader network infrastructure unless leveraged as a pivot point.

Mitigation Recommendations

1. Immediately restrict access to the management interface (/cgi-bin/dsk_mgr.cgi) by implementing network-level controls such as firewall rules or VPN-only access to prevent unauthorized remote connections. 2. Disable remote management features if not required, or restrict them to trusted IP addresses. 3. Monitor network traffic and device logs for unusual access patterns or repeated attempts to invoke disk management functions. 4. Apply any available firmware updates or patches from D-Link as soon as they are released addressing this vulnerability. 5. If patches are not yet available, consider isolating affected devices on segmented network zones with strict access controls to minimize exposure. 6. Educate users and administrators about the risks of exposing NAS management interfaces directly to the internet. 7. Regularly back up critical data stored on these devices to mitigate potential data loss from exploitation. 8. Employ intrusion detection/prevention systems to detect exploitation attempts targeting the vulnerable CGI endpoints. 9. Conduct periodic security assessments of NAS devices and their configurations to ensure compliance with best practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-04-01T12:13:37.400Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cd85bee6bfc5ba1df9d451

Added to database: 4/1/2026, 8:53:18 PM

Last enriched: 4/1/2026, 9:08:47 PM

Last updated: 4/1/2026, 9:56:33 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses