| Title | D-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/326/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Stack-based Buffer Overflow |
|---|
| Description | We found an stack overflow vulnerability in D-Link Technology NAS device with firmware which was released recently, allows remote attackers to crash the server.In cgi_addgroup_get_group_quota_minsize function, name is directly passed by the attacker, If this part of the data is too long, it will cause the stack overflow, so we can control the name to execute arbitrary code. |
|---|
| Source | ⚠️ https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_169/169.md |
|---|
| User | Ziyue Xie (UID 89123) |
|---|
| Submission | 03/15/2026 14:39 (22 days ago) |
|---|
| Moderation | 03/31/2026 12:30 (16 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 354349 [D-Link DNS-1550-04 up to 20260205 /cgi-bin/account_mgr.cgi cgi_addgroup_get_group_quota_minsize Name stack-based overflow] |
|---|
| Points | 20 |
|---|