D-Link Buffer Overflow (CVE-2026-4529)
CVE-2026-4529
A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. T...
Overview
A critical security flaw, identified as CVE-2026-4529, has been discovered in the D-Link DHP-1320 wireless router, specifically in firmware version 1.00WWB04. This is a stack-based buffer overflow vulnerability located within the device’s SOAP (Simple Object Access Protocol) handler, a service used for network management. The vulnerability can be triggered remotely by an attacker without requiring authentication, making it particularly dangerous.
Vulnerability Details
The flaw exists in the redirect_count_down_page function. In simple terms, this function does not properly check the size of input data it receives before processing it. An attacker can send a specially crafted, oversized network request to the router’s SOAP service. This excess data overflows a fixed-size memory buffer (the “stack”), which can corrupt the router’s normal operation and allow the attacker to run their own malicious code on the device.
The exploit for this vulnerability is publicly available, significantly increasing the risk of active attacks. It is important to note that the D-Link DHP-1320 is no longer supported by the manufacturer, meaning no official security patch will be released.
Impact and Risk
With a high CVSS score of 8.8, this vulnerability poses a serious threat. A successful attack could allow a remote actor to:
- Take full control of the router.
- Install malware or spyware to monitor all network traffic.
- Redirect users to malicious websites (phishing).
- Use the compromised device as a foothold to attack other devices on your internal network (like computers and phones).
Given the public exploit and lack of vendor support, affected devices are highly likely to be targeted. For the latest on active threats, monitor our security news section.
Remediation and Mitigation
Since no official firmware update is available, the primary recommendation is immediate isolation and replacement.
Recommended Action:
- Replace the Device: The only secure course of action is to retire the affected D-Link DHP-1320 router and replace it with a currently supported model from any vendor. Ensure the new device receives regular firmware updates.
- Immediate Mitigation (If Replacement is Delayed): If you must temporarily keep the device online, isolate it. Do not expose its web administration interface (typically ports 80, 443, 8080) to the internet. Ensure it is placed behind another firewall if possible. This is a stopgap measure and does not eliminate the risk from internal network threats.
Important Note: Resetting the router to factory settings does not fix this vulnerability, as it is a flaw in the firmware itself.
Organizations should inventory their networks for this model. Failure to address this flaw could lead to a network compromise and potential data breach. You can review historical incidents in our breach reports to understand the potential consequences.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument P...
A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The at...
A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromqossetting of the file /goform/qossetting. Executing a manipulation of the argument qos can lead to buffer overflow. The atta...
A vulnerability was found in Tenda F453 1.0.0.3. This issue affects the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page results in buffer overflow. The attack may ...