LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-5214 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: March 31, 2026

D-Link DNS - Buffer Overflow

Published: March 31, 2026Updated: March 31, 2026Remote Exploitable

Overview

D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 <= 20260205 contain a stack-based buffer overflow caused by manipulation of the "Name" argument in /cgi-bin/account_mgr.cgi cgi_addgroup_get_group_quota_minsize function, letting remote attackers execute arbitrary code, exploit requires remote access.

Severity & Score

Severity: High
CVSS Score: 8.8

Impact

Remote attackers can execute arbitrary code, potentially leading to full system compromise.

Mitigation

Update to the latest available version beyond 20260205.

Details

CVE ID
CVE-2026-5214
Severity
High
CVSS Score
8.8
Type
buffer_overflow
Status
new

CWE

  • CWE-119

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H