CVE-2026-5212 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 31, 2026
D-Link - Buffer Overflow
Published: March 31, 2026Updated: March 31, 2026Remote Exploitable
Overview
D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 <= 20260205 contain a stack-based buffer overflow caused by manipulation of the "f_file" argument in /cgi-bin/webdav_mgr.cgi Webdav_Upload_File function, letting remote attackers execute arbitrary code, exploit requires no special privileges.
Severity & Score
Severity: High
CVSS Score: 8.8
Impact
Remote attackers can execute arbitrary code, potentially leading to full system compromise.
Mitigation
Update to the latest available version beyond 20260205.
References
Related Resources
Details
- CVE ID
- CVE-2026-5212
- Severity
- High
- CVSS Score
- 8.8
- Type
- buffer_overflow
- Status
- new
CWE
- CWE-119
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H