Platform
dlink
Component
my_vuln
Fixed in
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
CVE-2026-5211 describes a critical stack-based buffer overflow vulnerability affecting a range of D-Link DNS routers. Successful exploitation allows a remote attacker to potentially execute arbitrary code on the vulnerable device. This flaw impacts models including DNS-120, DNR-202L, and several others, specifically those running firmware versions up to and including 20260205. A patch is expected from D-Link.
The vulnerability lies within the UPnPAVServerPathDel function of the /cgi-bin/appmgr.cgi file. An attacker can exploit this by manipulating the 'fdir' argument, causing a stack-based buffer overflow. This overflow can overwrite critical memory regions, potentially allowing the attacker to gain control of the router. Given the router's role in network connectivity and often containing sensitive configuration data, a successful exploit could lead to complete system compromise, data theft, and unauthorized access to the internal network. The published exploit significantly increases the risk of immediate exploitation.
The exploit for CVE-2026-5211 has been publicly released, indicating a high probability of exploitation. It is crucial to apply the patch as soon as it becomes available. The vulnerability's ease of exploitation and the router's common deployment make it a significant threat. The vulnerability is not currently listed on CISA KEV, but its public exploit status warrants close monitoring.
Exploit Status
EPSS
0.03% (9% percentile)
CISA SSVC
CVSS Vector
The primary mitigation is to upgrade the affected D-Link DNS routers to a firmware version that includes the security patch. D-Link is expected to release a patch soon. Until the patch is available, consider implementing temporary workarounds such as restricting access to the /cgi-bin/app_mgr.cgi endpoint using a firewall or access control list (ACL). Web application firewalls (WAFs) configured to detect and block buffer overflow attempts targeting UPnP functionality can also provide some protection. Monitor router logs for unusual activity or error messages related to the UPnP service.
Update the firmware of your D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 to a version later than 20260205 to correct the stack-based buffer overflow vulnerability in the UPnP_AV_Server_Path_Del function of the /cgi-bin/app_mgr.cgi file.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-5211 is a HIGH severity buffer overflow vulnerability in D-Link DNS routers, allowing remote code execution via manipulation of the fdir argument in /cgi-bin/appmgr.cgi.
You are affected if you are using a D-Link DNS router (DNS-120, DNR-202L, etc.) with firmware versions up to and including 20260205.
Upgrade your D-Link DNS router to the latest available firmware version that includes the security patch. Monitor D-Link's website for the official advisory.
Yes, a public proof-of-concept exploit has been released, indicating active exploitation is likely.
Refer to D-Link's security advisory page for updates and the official patch release: https://www.dlink.com/support/security-updates
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.