Vulnerability Description
A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This vulnerability affects the function cgi_myfavorite_del_user/cgi_myfavorite_verify of the file /cgi-bin/gui_mgr.cgi. Performing a manipulation results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dnr-202L Firmware | <= 2026-02-05 |
| Dlink | Dnr-202L | - |
| Dlink | Dnr-326 Firmware | <= 2026-02-05 |
| Dlink | Dnr-326 | - |
| Dlink | Dns-1100-4 Firmware | <= 2026-02-05 |
| Dlink | Dns-1100-4 | - |
| Dlink | Dns-120 Firmware | <= 2026-02-05 |
| Dlink | Dns-120 | - |
| Dlink | Dns-1200-05 Firmware | <= 2026-02-05 |
| Dlink | Dns-1200-05 | - |
| Dlink | Dns-1550-04 Firmware | <= 2026-02-05 |
| Dlink | Dns-1550-04 | - |
| Dlink | Dns-315L Firmware | <= 2026-02-05 |
| Dlink | Dns-315L | - |
| Dlink | Dns-320 Firmware | <= 2026-02-05 |
| Dlink | Dns-320 | - |
| Dlink | Dns-320L Firmware | <= 2026-02-05 |
| Dlink | Dns-320L | - |
| Dlink | Dns-320Lw Firmware | <= 2026-02-05 |
| Dlink | Dns-320Lw | - |
Related Weaknesses (CWE)
References
- https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_162/162.mdExploitThird Party Advisory
- https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_163/163.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.351124Permissions RequiredVDB Entry
- https://vuldb.com/?id.351124Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.770443Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.770444Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2026-4213?
CVE-2026-4213 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4...
How severe is CVE-2026-4213?
CVE-2026-4213 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-4213?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dnr-202L Firmware, Dlink Dnr-202L, Dlink Dnr-326 Firmware, Dlink Dnr-326, Dlink Dns-1100-4 Firmware.