CVE-2026-4529 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 23, 2026
D-Link DHP-1320 - Buffer Overflow
Overview
D-Link DHP-1320 1.00WWB04 contains a stack-based buffer overflow caused by manipulation in the SOAP Handler's redirect_count_down_page function, letting remote attackers execute code, exploit requires no special privileges.
Severity & Score
Impact
Remote attackers can execute arbitrary code, potentially leading to full system compromise.
Mitigation
Upgrade to the latest supported version or replace the product as it is no longer maintained.
References
Social Media Activity(2 posts)
šØ CVE-2026-4529: HIGH severity stack-based buffer overflow in D-Link DHP-1320 (1.00WWB04) via SOAP Handler. Public exploit out. Device is EOL, no patch ā isolate or replace now! https://radar.offseq.com/threat/cve-2026-4529-stack-based-buffer-overflow-in-d-lin-7f100378 #OffSeq #Vulnerability #DLink #BufferOverflow #InfoSec
View original postš CVE-2026-4529 - High (8.8) A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. The attack can be executed remotely. The exploit... š https://www.thehackerwire.com/vulnerability/CVE-2026-4529/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-4529
- Severity
- High
- CVSS Score
- 8.8
- Type
- buffer_overflow
- Status
- unconfirmed
- EPSS
- 4.5%
- Social Posts
- 2
CWE
- CWE-119
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H