CVE-2026-5215 | D-Link DNS-1550-04 up to 20260205 /cgi-bin/network_mgr.cgi cgi_get_ipv6 access control VulDB Recent Entries 2 days 13 hours ago A vulnerability labeled as critical has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The impacted element is the function cgi_get_ipv6 of the file /cgi-bin/network_mgr.cgi. Such manipulation leads to improper access controls. This vulnerability is referenced as CVE-2026-5215. The attack needs to be initiated within the local network. Furthermore, an exploit is available. vuldb.com
Нейросети научились раздевать людей, а политики — запрещать технологии. Кто победит в этой битве Securitylab.ru 2 days 13 hours ago Популярным алгоритмам придётся найти себе дело попристойнее.
CVE-2026-5213 | D-Link DNS-1550-04 up to 20260205 /cgi-bin/account_mgr.cgi cgi_adduser_to_session read_list stack-based overflow VulDB Recent Entries 2 days 13 hours ago A vulnerability identified as critical has been detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The affected element is the function cgi_adduser_to_session of the file /cgi-bin/account_mgr.cgi. This manipulation of the argument read_list causes stack-based buffer overflow. The identification of this vulnerability is CVE-2026-5213. It is possible to initiate the attack remotely. Furthermore, there is an exploit available. vuldb.com
CVE-2026-5214 | D-Link DNS-1550-04 up to 20260205 /cgi-bin/account_mgr.cgi cgi_addgroup_get_group_quota_minsize Name stack-based overflow VulDB Recent Entries 2 days 13 hours ago A vulnerability categorized as critical has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Impacted is the function cgi_addgroup_get_group_quota_minsize of the file /cgi-bin/account_mgr.cgi. The manipulation of the argument Name results in stack-based buffer overflow. This vulnerability was named CVE-2026-5214. The attack may be performed from remote. In addition, an exploit is available. vuldb.com
CVE-2026-5212 | D-Link DNS-1550-04 up to 20260205 /cgi-bin/webdav_mgr.cgi Webdav_Upload_File f_file stack-based overflow VulDB Recent Entries 2 days 13 hours ago A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. It has been rated as critical. This issue affects the function Webdav_Upload_File of the file /cgi-bin/webdav_mgr.cgi. The manipulation of the argument f_file leads to stack-based buffer overflow. This vulnerability is uniquely identified as CVE-2026-5212. The attack is possible to be carried out remotely. Moreover, an exploit is present. vuldb.com
CVE-2026-5211 | D-Link DNS-1550-04 up to 20260205 /cgi-bin/app_mgr.cgi UPnP_AV_Server_Path_Del f_dir stack-based overflow VulDB Recent Entries 2 days 13 hours ago A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. It has been declared as critical. This vulnerability affects the function UPnP_AV_Server_Path_Del of the file /cgi-bin/app_mgr.cgi. Executing a manipulation of the argument f_dir can lead to stack-based buffer overflow. This vulnerability is handled as CVE-2026-5211. The attack can be executed remotely. Additionally, an exploit exists. vuldb.com
Release Notes: Cross-Platform Threat Analysis with macOS, SSL Decryption, and 1,300+ New Detections 不安全 2 days 13 hours ago 好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得快速浏览文章,找出主要信息。 文章主要讲的是ANY.RUN公司在三月份推出了几个重要的产品更新和威胁检测方面的进展。产品更新包括自动SSL解密、支持macOS沙盒分析和Windows Server分析。威胁检测方面增加了新的行为签名和Suricata规则,还发布了新的威胁情报报告。 接下来,我需要把这些要点浓缩成一句话,确保不超过100字。要突出产品改进和威胁检测的加强,以及这些改进带来的好处,比如提高检测率、缩短响应时间等。 最后,检查一下是否符合用户的要求:用中文、直接描述内容、不使用特定的开头语句。确保语言简洁明了。 ANY.RUN在三月推出多项改进,包括自动SSL解密提升钓鱼检测能力、支持macOS沙盒分析及Windows Server环境分析,并新增91个行为签名和1,293个Suricata规则,以增强威胁覆盖能力。
Submit #780440: D-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/326/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Improper Access Controls [Accepted] Vuldb Submit 2 days 13 hours ago Submit #780440 / VDB-354351 Ziyue Xie
Submit #780437: D-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/326/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Stack-based Buffer Overflow [Accepted] Vuldb Submit 2 days 13 hours ago Submit #780437 / VDB-354350 Ziyue Xie
Submit #780439: D-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/326/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Stack-based Buffer Overflow [Accepted] Vuldb Submit 2 days 13 hours ago Submit #780439 / VDB-354349 Ziyue Xie
Submit #780436: D-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/326/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Stack-based Buffer Overflow [Duplicate] Vuldb Submit 2 days 13 hours ago Submit #780436 / VDB-354348 Ziyue Xie
Submit #780435: D-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/326/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Stack-based Buffer Overflow [Accepted] Vuldb Submit 2 days 13 hours ago Submit #780435 / VDB-354348 Ziyue Xie
Submit #780434: D-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/326/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Stack-based Buffer Overflow [Accepted] Vuldb Submit 2 days 13 hours ago Submit #780434 / VDB-354347 Ziyue Xie
关注 | 丝芙兰、泡泡玛特、易次元等71款违法违规收集使用个人信息的移动应用被通报! 中国信息安全 2 days 13 hours ago 依据《网络安全法》《个人信息保护法》等法律法规,经国家计算机病毒应急处理中心检测,71款移动应用存在违法违规收集使用个人信息情况。
通知 | 网安标委发布《网络安全标准实践指南——工业企业数据安全能力成熟度模型》 中国信息安全 2 days 13 hours ago 近期,网安标委发布《网络安全标准实践指南——工业企业数据安全能力成熟度模型》。