Stack-based Buffer Overflow in D-Link Network Storage Products
CVE-2026-5213
8.7HIGH
Key Information:
Badges
๐พ Exploit Exists๐ก Public PoC
What is CVE-2026-5213?
A stack-based buffer overflow vulnerability exists in the cgi_adduser_to_session function within the /cgi-bin/account_mgr.cgi file of several D-Link network storage devices. This flaw can be exploited remotely by manipulating the read_list argument, resulting in potential unauthorized access or system compromise. The vulnerability has been publicly disclosed, heightening the risk of exploitation.
Affected Version(s)
DNR-202L 20260205
DNR-322L 20260205
DNR-326 20260205
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Ziyue Xie (VulDB User)