Platform
dlink
Component
my_vuln
Fixed in
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
20260205.0.1
CVE-2026-5212 describes a critical stack-based buffer overflow vulnerability affecting a range of D-Link DNS routers. This flaw resides within the WebdavUploadFile function of the /cgi-bin/webdavmgr.cgi file and allows remote attackers to manipulate the ffile argument, potentially leading to arbitrary code execution. The vulnerability impacts D-Link DNS-120, DNR-202L, DNS-315L, and numerous other models released up to version 20260205. A patch is required to remediate this issue.
Successful exploitation of CVE-2026-5212 allows an attacker to execute arbitrary code on the affected D-Link router. This could lead to complete system compromise, enabling attackers to modify router configurations, steal sensitive data (usernames, passwords, network traffic logs), and potentially pivot to other devices on the network. The remote nature of the vulnerability significantly broadens the attack surface, as exploitation does not require local access. Given the routers' function as network gateways, a successful attack could compromise the entire internal network behind the router, resulting in a significant blast radius. The public disclosure of the exploit increases the risk of immediate exploitation.
CVE-2026-5212 has been publicly disclosed, indicating a higher probability of exploitation. The vulnerability is not currently listed on CISA KEV, but the public availability of an exploit suggests a medium to high exploitation probability. Public proof-of-concept exploits are likely to emerge, further increasing the risk. The vulnerability was published on 2026-03-31, and the potential for widespread exploitation is significant given the prevalence of D-Link routers.
Exploit Status
EPSS
0.10% (28% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-5212 is to upgrade the affected D-Link routers to a firmware version containing a patch. Unfortunately, a specific fixed-in version is not provided in the CVE details. If upgrading is not immediately feasible, consider implementing temporary workarounds such as restricting access to the /cgi-bin/webdavmgr.cgi endpoint using a firewall or web application firewall (WAF). Monitor router logs for suspicious activity related to file uploads. Implement strict input validation on any web-based file upload functionality. After upgrading the firmware, verify the fix by attempting to trigger the vulnerability with a crafted ffile argument and confirming that the router does not crash or exhibit unexpected behavior.
Update the firmware of your D-Link DNS-1550-04 device to a version later than 20260205 to correct the stack-based buffer overflow vulnerability. Refer to the D-Link website for the latest firmware updates and installation instructions.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-5212 is a HIGH severity buffer overflow vulnerability in D-Link DNS routers, allowing remote code execution through manipulation of the 'f_file' argument in a web interface.
You are affected if you are using a D-Link DNS router (DNS-120, DNR-202L, etc.) with firmware versions equal to or earlier than 20260205.
Upgrade your D-Link DNS router to a patched firmware version. Check the D-Link support website for available updates. If upgrading is not possible, implement temporary workarounds like firewall restrictions.
The vulnerability has been publicly disclosed, and public exploits are likely to emerge, increasing the risk of active exploitation.
Refer to the D-Link security advisory page for the latest information and firmware updates related to CVE-2026-5212.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.