ID

VAR-202604-0419


CVE

CVE-2026-5311


DESCRIPTION

A security flaw has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected is the function Webdav_Access_List of the file /cgi-bin/file_center.cgi. Performing a manipulation of the argument cmd results in improper access controls. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.

Trust: 1.0

sources: NVD: CVE-2026-5311

AFFECTED PRODUCTS

vendor:dlinkmodel:dnr-202lscope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-343scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-322lscope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dnr-326scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-320lwscope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-320scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-1100-4scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-315lscope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-345scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-326scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-340lscope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-327lscope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-120scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-320lscope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-323scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-1200-05scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-321scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-325scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-1550-04scope:lteversion:2026-02-05

Trust: 1.0

vendor:dlinkmodel:dns-726-4scope:lteversion:2026-02-05

Trust: 1.0

sources: NVD: CVE-2026-5311

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2026-5311
value: MEDIUM

Trust: 1.0

cna@vuldb.com: CVE-2026-5311
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

cna@vuldb.com: CVE-2026-5311
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

sources: NVD: CVE-2026-5311

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.0

problemtype:CWE-266

Trust: 1.0

sources: NVD: CVE-2026-5311

EXTERNAL IDS

db:NVDid:CVE-2026-5311

Trust: 1.0

sources: NVD: CVE-2026-5311

REFERENCES

url:https://vuldb.com/vuln/354640/cti

Trust: 1.0

url:https://vuldb.com/vuln/354640

Trust: 1.0

url:https://github.com/wudipjq/my_vuln/blob/main/d-link8/vuln_171/171.md

Trust: 1.0

url:https://www.dlink.com/

Trust: 1.0

url:https://vuldb.com/submit/780441

Trust: 1.0

sources: NVD: CVE-2026-5311

SOURCES

db:NVDid:CVE-2026-5311

LAST UPDATE DATE

2026-04-08T23:58:07.970000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2026-5311date:2026-04-07T15:43:56.293

SOURCES RELEASE DATE

db:NVDid:CVE-2026-5311date:2026-04-01T20:16:29.950